IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
26 - 50 of 1751 Matches Previous Page  |  Next Page
Key Considerations in Deploying an SSL Solution
sponsored by F5 Networks
WHITE PAPER: In this white paper, learn what you need to know about Secure Sockets Layer (SSL) and how to construct your security strategy.
Posted: 21 Apr 2017 | Published: 30 Dec 2016

F5 Networks

Docker In Production: Regaining The Promise
sponsored by Apcera
WHITE PAPER: When Docker came out in 2013, it was full of promise for quicker application startup times, choice of hosting environments, better hardware utilization, etc. Access this white paper to learn about the networking, storage, and security and operational challenges that Docker faced, as well as how to overcome them.
Posted: 21 Apr 2017 | Published: 30 Nov 2016


SailPoint-Get-Ready-for-GDPR
sponsored by SailPoint Technologies
WHITE PAPER: Learn how to utilize both identity and data access governance to gain full visibility to help you comply with the upcoming GDPR deadline.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

SailPoint Technologies

The Role of Policy in Governing and Securing the Cloud
sponsored by Apcera
WHITE PAPER: Learn how to enable your security policy to help mitigate human errors and avoid costly data breaches. Additionally uncover 4 key areas where you need a security policy, a 3-part methodology to modern policy, and more.
Posted: 21 Apr 2017 | Published: 29 Feb 2016


Do You Know Who Owns Your Data?
sponsored by SailPoint Technologies
WHITE PAPER: Access this white paper to learn how to reduce the risk of your unstructured data being used negligently or maliciously, elect the right "data owners" to ensure the security of your data, and more.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

SailPoint Technologies

Safeguarding Healthcare Information and Leveraging Email Encryption in Your HIPAA Compliance Program
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn how to choose the right email encryption tool for your healthcare organization by keeping these 6 key differentiators in mind as you evaluate potential solutions.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

Hewlett Packard Enterprise

The Ultimate Guide to the CCSP
sponsored by ISC2
WHITE PAPER: Learn how to prepare yourself for getting a CCSP certification, named the #1 cloud computing certification for 2017 by Cloud Computing Intelligence.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

ISC2

Is the Future of Enterprise Security In Managed Services?
sponsored by F5 Networks
WHITE PAPER: Security is becoming an increasingly complex and costly challenge for many organizations to manage on premises. Access this white paper now to learn the potential benefits of outsourcing cybersecurity and more.
Posted: 19 Apr 2017 | Published: 19 Apr 2017

F5 Networks

Hackers Share Secrets so You Can Make Their Job Harder
sponsored by Thycotic
WHITE PAPER: Discover 5 secrets hackers shared at the 2016 Black Hat conference that you can use to make their jobs more difficult and secure your passwords and privileged accounts.
Posted: 19 Apr 2017 | Published: 31 Dec 2016

Thycotic

NSS Labs Advanced Endpoint Protection Test Report
sponsored by McAfee, Inc.
WHITE PAPER: NSS Labs performed an independent and rigorous test of the McAfee Endpoint Security v10.5 product to see how it stacks up against the competition. This report provides detailed information about this endpoint strategy and its security effectiveness.
Posted: 18 Apr 2017 | Published: 14 Feb 2017

McAfee, Inc.

Passwords Defined: Build Stronger Passwords
sponsored by Specops Software
WHITE PAPER: Learn 2 actionable insights to make your passwords less vulnerable to brute force and dictionary-style attacks. Discover what makes common passwords weak, and what to avoid when choosing yours.
Posted: 18 Apr 2017 | Published: 05 Dec 2016

Specops Software

Password Security Checklist: Ensure PCI Compliance
sponsored by Specops Software
WHITE PAPER: Uncover vital questions to provide your organization with a good starting point on the path to improving your password security.
Posted: 18 Apr 2017 | Published: 18 Apr 2017

Specops Software

Employee Social Network Password Practices a Major Workplace Risk
sponsored by Thycotic
WHITE PAPER: A survey conducted at the February 2017 RSA Conference in San Francisco reveals startling and disturbing insights into the password habits of security professionals (and likely their fellow employees). Discover key survey findings that can help protect your organization.
Posted: 17 Apr 2017 | Published: 30 Dec 2016

Thycotic

Become GDPR-Ready and Data- Driven with an Expanded Information Management Portfolio
sponsored by Veritas
WHITE PAPER: Discover the growing importance of changing data protection regulations — in particular, the GDPR and how it takes information management out of the IT room and into the boardroom.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Veritas

15 Easy Ways to Integrate, Orchestrate, and Expedite Security Operations
sponsored by McAfee, Inc.
WHITE PAPER: This white paper explains how to overcome the complexity of security operations integration and enable high-speed communication between applications for the protection you need today.
Posted: 17 Apr 2017 | Published: 31 Mar 2017

McAfee, Inc.

Compliance Survey: Your Guide to What Experts are Saying
sponsored by Chef Software
WHITE PAPER: Access this survey report now to learn how to mitigate the struggles faced when companies assess compliance or attempt to fix a compliance violation or security vulnerability, what priorities to set when attempting continuous improvement on overall security and performance, and more.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Chef Software

SANS Survey: Security and Accountability in the Cloud Data Center
sponsored by McAfee, Inc.
WHITE PAPER: How has cloud security changed this year? Has it improved? Stayed the same? Worsened? This report summarizes the second annual SANS survey of IT professionals using a variety of cloud providers and service models, including SaaS, IaaS, and PaaS implementations.
Posted: 17 Apr 2017 | Published: 30 Nov 2016

McAfee, Inc.

Beat Ransomware in 5 Easy Steps
sponsored by Unitrends
WHITE PAPER: With the FBI stating that: "The ransomware is that good. To be honest, we often advise people just to pay the ransom," the threat is obvious. Access this white paper now to learn how to beat ransomware in 5 easy steps.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Unitrends

Privileged Account Management for Dummies
sponsored by Thycotic
WHITE PAPER: Uncover how privileged account management is more important to understand and protect today than ever before. This guide will help you to avoid catastrophic data breaches and possible massive monetary and reputational damage to your organization.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Thycotic

5 Steps to Quantifying Insider Risk
sponsored by Veriato, Inc.
WHITE PAPER: Security is a matter of numbers: vague alerts like "we are at risk" do little for the security professional tackling the issue at hand. Learn 4 "insider risk laws", 5 steps to quantifying and addressing insider risk, and more.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

Veriato, Inc.

Keep Hires From Starting Fires: Risk Mitigation
sponsored by Veriato, Inc.
WHITE PAPER: Discover some common sense suggestions for improving the "beginning of the life cycle" risk mitigation process and reducing the exposure of your organization to possible insider threats.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

Veriato, Inc.

GPDR: How the Data Privacy Revolution Can Work For You
sponsored by Veritas
WHITE PAPER: Learn how the GDPR will affect your organization. Discover how to take advantage of the opportunity by taking a holistic view of information governance and turn the huge amount of unstructured backup data into available and usable information assets.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

Veritas

User Behavior Analytics: 11 Industry Leaders Offer Peer Insight
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover peer insight into User Behavior Analytics (UBA), the result of interviews with 11 security leaders who have deployed or are looking to deploy 3rd party solutions.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

LogRhythm, Inc.

4 Steps to Reduce the Risk of Malicious Insider Activity
sponsored by Veriato, Inc.
WHITE PAPER: Learn 4 key steps in implementing a risk-based monitoring program, culminating in an ability to appropriately monitor user activity at every level, all while ensuring security and privacy are maintained.
Posted: 13 Apr 2017 | Published: 13 Apr 2017

Veriato, Inc.

Improving Efficiency and Effectiveness with a Security Incident Response Platform
sponsored by IBM
WHITE PAPER: Discover how the combination of a SIEM with an incident response platform will help your organization overcome cybersecurity and compliance issues and take a big step closer to being "cyber resilient".
Posted: 13 Apr 2017 | Published: 30 Nov 2016

IBM
26 - 50 of 1751 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement