IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
26 - 50 of 1645 Matches Previous Page  |  Next Page
Cloud Security in an Agile World
sponsored by Rackspace
WHITE PAPER: This white paper tells you exactly what those precautions are and how to take them when dealing with the cloud.
Posted: 20 Feb 2015 | Published: 31 Dec 2014

Rackspace

IBM X-Force Threat Intelligence Quarterly - 3Q 2014
sponsored by IBM
WHITE PAPER: This exclusive white paper takes a look at how Heartbleed impacted organizations around the world.
Posted: 20 Feb 2015 | Published: 31 Aug 2014

IBM

Mobility on hold: Get back on track with mobile risk mitigation
sponsored by IBM
WHITE PAPER: This white paper introduces one security system that keeps up with the risks of mobile banking.
Posted: 20 Feb 2015 | Published: 31 Dec 2013

IBM

Internet of Things
sponsored by Axway
WHITE PAPER: The Internet of Things can be very beneficial, but security and privacy are crucial. Since the devices in the Internet of Things rely on APIs to communicate, the management of these APIs is also crucial. Access this white paper key to learn how to enable the Internet of Things through efficient API management implemented with speed and security.
Posted: 19 Feb 2015 | Published: 24 Sep 2013

Axway

7 Steps to Securing Healthcare Infrastructures Using a Cloud Security Plan
sponsored by NaviSite
WHITE PAPER: This resource outlines the 7 steps you need to follow in order to secure infrastructures using a cloud security plan. By adhering to the following seven-step plan, you can bank on a proven methodology for cost-effectively and securely leveraging cloud services.
Posted: 19 Feb 2015 | Published: 18 Feb 2015

NaviSite

Discover How to Guard Against Healthcare Cybercrime
sponsored by NaviSite
WHITE PAPER: Healthcare data is as valuable as gold on the black market, and thieves are drawn to the profits. Now, with more data stored digitally and more hackers taking advantage of that, the healthcare industry needs better security than ever.
Posted: 19 Feb 2015 | Published: 01 Jan 2015

NaviSite

How Smart Enterprises are Tackling Workspace Transformation
sponsored by Unisys
WHITE PAPER: Access this white paper to discover how workspace-as-a-service is a user centric approach to modern workspaces that allows for anytime, anywhere access.
Posted: 19 Feb 2015 | Published: 31 Dec 2014


Application Whitelisting: Discover the Pros and Cons
sponsored by Threat Track Security
WHITE PAPER: This webpage explores the option of whitelisting, dissecting its pros and cons.
Posted: 18 Feb 2015 | Published: 04 Nov 2013

Threat Track Security

Predictions from the Front Lines for Cybersecurity in 2015
sponsored by Threat Track Security
WHITE PAPER: This white paper summarizes the results of a survey of security professionals, revealing what IT professionals are thinking and why in 2015.
Posted: 18 Feb 2015 | Published: 18 Feb 2015

Threat Track Security

The Security Value of a Dozen Next Generation Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER: A security research group has put together an info-graphic that summarizes the results of independent studies on a dozen different NGFW products.
Posted: 18 Feb 2015 | Published: 30 Sep 2014

Cisco Systems, Inc.

Discover the Capabilities of a Next Generation Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: This in-depth white paper provides a close look at a next generation firewall, describing each of its capabilities in detail.
Posted: 18 Feb 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Next-Generation Network Security: A Buyers’ Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: This buyer's guide provides an in-depth explanation of the factors that impel organizations to look at next generation security solutions.  Read on to learn more.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

Cisco Systems, Inc.

Optimizing Enterprise Security: Intelligence, Control, and Response
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explores the factors that make network security management and operations more difficult today than ever before.
Posted: 17 Feb 2015 | Published: 28 Nov 2014

ForeScout Technologies, Inc.

Implement a Dynamic Mobile Strategy Within Your Organization
sponsored by CA Technologies.
WHITE PAPER: Access this informative resource to learn about incorporating the best mobile practices within your organization.
Posted: 17 Feb 2015 | Published: 31 Dec 2014

CA Technologies.

A Detailed Report on a Strong and Effective Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: This detailed white paper gives you all the detail you need on a firewall that's stable, reliable, and able to block over 99% of threats.
Posted: 17 Feb 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Defending Against Rogue Users, Devices, and Applications
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explains how NAC technologies help to ensure that only appropriate users, devices, and applications have access to your network resources, enabling you to support your users in a secure, efficient way.
Posted: 17 Feb 2015 | Published: 29 Aug 2014

ForeScout Technologies, Inc.

Executive ViewPoint - Successfully Securing Applications in a Mobility-Focused World
sponsored by F5 Networks
WHITE PAPER: In this whitepaper, F5's Karl Triebes and VMware's Kit Colbert share their perspectives on where the market is headed, and how IT organizations can stay ahead of the curve. Read on to learn more.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

F5 Networks

Integrated Network Security Architecture: Threat-focused Next-generation Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: How bad have things gotten and what should CISOs do to address these issues? Find out now by reading this whitepaper.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

Cisco Systems, Inc.

Changing Face of Mobility: Raises The Stakes For Endpoint Data Protection
sponsored by CommVault
WHITE PAPER: This white paper highlights some potentially troubling byproducts of that movement. Read on to learn more.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

CommVault

Cisco 2015 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This report reveals up-to-date data on many of the most important security concerns facing organizations in 2015.
Posted: 16 Feb 2015 | Published: 01 Jan 2015

Cisco Systems, Inc.

Collaboration—Understand the Business Value and How to Make It Work
sponsored by Unify
WHITE PAPER: View this informative white paper to get some insight and an information framework to aid in successful planning and deployment of collaboration solutions.
Posted: 16 Feb 2015 | Published: 31 Oct 2014

Unify

The Impact of New Communications in the Energy Industry
sponsored by Actiance
WHITE PAPER: This white paper discusses the use of instant messaging technology in the energy industry, explaining why monitoring, logging, and archiving these communications is a necessity for achieving compliance and protecting critical assets from cyberattacks.
Posted: 16 Feb 2015 | Published: 30 May 2014

Actiance

North Korea and the Attack on Sony Pictures Entertainment
sponsored by Hewlett-Packard Company
WHITE PAPER: While the FBI has named North Korea as a culprit in the significant breach on Sony Pictures Entertainment in 2014, it's still possible that the regime didn't act alone. This resource discusses the critical threat intelligence issues that the breach highlights; analyzes North Korea's purported involvement and motivation; and much more.
Posted: 13 Feb 2015 | Published: 19 Dec 2014

Hewlett-Packard Company

Top Enterprise Mobile Security Issues
sponsored by BlackBerry
WHITE PAPER: In this expert guide, Kathleen Richards and Robert Westervelt parse the results of an informative SearchSecurity.com survey that elucidates the mobile security issues continuing to mount in enterprises today.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

BlackBerry

4 Data Traffic Security Challenges Exposing Enterprises to Hack Attacks
sponsored by Certes Networks
WHITE PAPER: This white paper discusses the 4 major points of weakness that your enterprise needs to prioritize in 2015 in order to defend your business-critical data from hackers.
Posted: 12 Feb 2015 | Published: 22 Jan 2015

Certes Networks
26 - 50 of 1645 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement