IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
26 - 50 of 1658 Matches Previous Page  |  Next Page
Data Security for the Most Sensitive Materials
sponsored by IntraLinks, Inc
WHITE PAPER: Download and discover how you can make even the most sensitive data safe from falling into the wrong hands while simplifying business processes and cutting costs.
Posted: 20 May 2015 | Published: 26 Dec 2014

IntraLinks, Inc

Vulnerability Management for the Mid-Size: How to Run a World Class Program Even if You're Not IBM
sponsored by Risk IO
WHITE PAPER: In this white paper, discover how you can design a high-quality vulnerability management program on a midsized budget and with a small security team.
Posted: 20 May 2015 | Published: 20 May 2015

Risk IO

4 Factors Forcing IT to Modernize End-User Computing
sponsored by VMware
WHITE PAPER: Access this white paper to explore the top four end-user trends that are forcing IT to modernize end-user computing. Also, discover expert advice from CIOs as they share best practices for end-user computing management – even when time and budget are tight.
Posted: 19 May 2015 | Published: 31 Dec 2014

VMware

Examining File Sync and Sharing Security
sponsored by IntraLinks, Inc
WHITE PAPER: Inside this white paper, examine one file sync, share, and collaboration platform and how to secure data inside and outside of the enterprise. Continue reading to learn how you to remain compliant and if this approach is right for your organization.
Posted: 18 May 2015 | Published: 17 Dec 2014

IntraLinks, Inc

Windows Server 2012: Security in the Enterprise
sponsored by Dell and Microsoft
WHITE PAPER: In the following technology brief, learn about the various security challenges brought about by cloud and virtual desktop practices. Access now and learn how to handle these security deficiencies, including how to leverage Windows Server 2012 to help aid in the process.
Posted: 18 May 2015 | Published: 18 May 2015

Dell and Microsoft

Checklist: Online Security Strategy Key Considerations
sponsored by Melbourne IT
WHITE PAPER: The following white paper provides readers with a checklist designed to help assess your approach to online security and identify if there are any areas of your strategy that require reevaluation. Access now and gain a firm grasp on your online security strategy and learn what steps you can take to improve it.
Posted: 18 May 2015 | Published: 18 May 2015

Melbourne IT

Reduce Risk: Cisco Connected Factory Starter Kit
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to discover how this connected factory solution can help you plan, design, build, optimize, and manage your solution.
Posted: 15 May 2015 | Published: 01 Nov 2014

Cisco Systems, Inc.

Consolidate digital identities, devices, SaaS, apps and workflows with the cloud
sponsored by Matrix42
WHITE PAPER: This informative white paper reveals a solution that can help you enterprise perform at the top of its game through consolidation.
Posted: 15 May 2015 | Published: 15 May 2015

Matrix42

Securing Your Content Delivery Network
sponsored by Limelight Networks, Inc.
WHITE PAPER: In this brief white paper, you'll discover an in-network detection and attack mitigation solution that takes all the headaches out of content delivery network security.
Posted: 15 May 2015 | Published: 15 May 2015

Limelight Networks, Inc.

Is Your Content Really Secure?
sponsored by Limelight Networks, Inc.
WHITE PAPER: Access this brief white paper to learn how you can simplify the content security process.
Posted: 15 May 2015 | Published: 15 May 2015

Limelight Networks, Inc.

The Case for Hosted Exchange
sponsored by Rackspace
WHITE PAPER: This white paper reveals the benefits of managing Microsoft Exchange in the cloud and lays out the detailed costs of managing a hosted versus an on-premises Exchange environment.
Posted: 14 May 2015 | Published: 01 May 2013

Rackspace

Android for Work: Top 8 Security Considerations Every CISO Should Know
sponsored by MobileIron
WHITE PAPER: Access this white paper to learn how Android for Work and the Lollipop, the latest version of the Android OS, are cleaning up your most feared security concerns.
Posted: 14 May 2015 | Published: 14 May 2015

MobileIron

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM
WHITE PAPER: Access this white paper to learn the best practices for secure MALM. Don't leave your enterprise app store vulnerable to attacks.
Posted: 14 May 2015 | Published: 26 Dec 2014

IBM

Security Services: Beyond Malware and Antivirus
sponsored by AVG Technologies
WHITE PAPER: This white paper can help your MSP deliver effective and reliable security services in the modern threat landscape.
Posted: 14 May 2015 | Published: 14 May 2015

AVG Technologies

New Defence Strategy Needed To Combat Cybersecurity Adversaries
sponsored by Hewlett-Packard Company
WHITE PAPER: View this informative white paper to learn why companies need to implement a new defense strategy to keep cybercriminals at bay.
Posted: 13 May 2015 | Published: 13 May 2015

Hewlett-Packard Company

3 Tips for Choosing a NGFW
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this white paper, you'll three basic tips for choosing the best next generation firewall for your SMB and links to further helpful resources.
Posted: 13 May 2015 | Published: 13 May 2015

Cisco Systems, Inc.

What Android for Work Means for the Enterprise
sponsored by MobileIron
WHITE PAPER: Access this white paper now to learn why the latest version of Android and the new Android for Work program can simplify your mobile management efforts.
Posted: 13 May 2015 | Published: 13 May 2015

MobileIron

Reviews and Ratings for 11 Risk Management Products
sponsored by RSA
WHITE PAPER: In this Gartner report, you'll find reviews and ratings of eleven different products that promise make risk management and compliance easier.
Posted: 12 May 2015 | Published: 10 Mar 2015

RSA

Improving the Effectiveness of Log Analysis
sponsored by Hewlett-Packard Company
WHITE PAPER: Hackers leave tracks, and a good log management tool is the key to finding these tracks. This analyst report tests one log management tool to demonstrate an easy way of doing so.
Posted: 12 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Company

2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: In this report, discover what security professionals had to say about mobile security, endpoint security, and other important trends in the cybersecurity landscape.
Posted: 12 May 2015 | Published: 12 May 2015

Citrix

White Paper: Get Ahead with Cisco Connected Factory
sponsored by Cisco Systems, Inc.
WHITE PAPER: In the years ahead, sensor-embedded, Internet-ready machines will become increasingly commonplace for manufacturing firms. Are you ready? Discover how the Cisco Connected Factory can help you tap the potential of the Internet of Things (IoT) in manufacturing—download the white paper.
Posted: 11 May 2015 | Published: 11 May 2015

Cisco Systems, Inc.

Defending Against New Ransomware Threats
sponsored by Trend Micro
WHITE PAPER: In this white paper, discover five ways to make sure you're prepared for a ransomware attack.
Posted: 11 May 2015 | Published: 11 May 2015

Trend Micro

Custom Defense Against Targeted Attacks
sponsored by Trend Micro
WHITE PAPER: Read this white paper to discover how you can build custom-designed security that can withstand even the most advanced targeted attack.
Posted: 08 May 2015 | Published: 31 Dec 2014

Trend Micro

SCB Builds a Defense Against Malware
sponsored by Malwarebytes Corporation
WHITE PAPER: In this case study, learn the story of an architectural firm that dramatically decreased malware attacks while increasing productivity.
Posted: 08 May 2015 | Published: 08 May 2015


Sagicor Takes on Malware and Wins
sponsored by Malwarebytes Corporation
WHITE PAPER: This white paper tells the story of how one financial institution put a stop to their constant stream of malware attacks.
Posted: 08 May 2015 | Published: 08 May 2015

26 - 50 of 1658 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement