IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
51 - 75 of 1878 Matches Previous Page  |  Next Page
WhoDunIt? The Mystery of the Advanced Persistent Threat (APT)
sponsored by Kaspersky Lab
WHITE PAPER: For companies that experienced a targeted cyberattack, 68% report data loss or exposure as a direct result of the attack. Advanced Persistent Threats (APTs) are even more disconcerting. Learn how to protect your company's sensitive information from APT attacks, and discover real-world examples of companies who used Kaspersky for attribution.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Kaspersky Lab

Rising value, falling cost: App and desktop virtualization
sponsored by Citrix
WHITE PAPER: Download this white paper to discover an affordable way to enable mobility and agility while maintaining control and security with desktop virtualization.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Citrix

Ddos Jumpstart: 11 Best Practices for Mitigating the DDoS of Things
sponsored by A10 Networks
WHITE PAPER: Learn how to proactively detect and mitigate even advanced, multi-vector DDoS attacks. Plus, find out how to protect your network and key business apps by implementing 11 best practices.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

A10 Networks

So You've Been Breached: What to Do Next
sponsored by Armor
WHITE PAPER: When your system is breached by a malicious attack, it's no time to panic, it's time to act. Inside, discover the 5 steps you need to take to stop the exfiltration of data and return your system to normal operations with as minimal damage as possible.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Armor

Security Investigation and Rapid Response Using Splunk and AWS
sponsored by Splunk
WHITE PAPER: Cloud is always seen as a security weakpoint--but what if you could turn the cloud to your advantage? By utilizing an analytics-driven approach to security, you can turn your AWS cloud deployments into a security tool. Take a minute to read this white paper and see how you can turn your weakness into an advantage.
Posted: 30 Aug 2017 | Published: 31 Jul 2017

Splunk

How to Enhance AWS Security
sponsored by Splunk
WHITE PAPER: Here, you'll uncover guidance on enhancing AWS platform security, to quell data protection concerns. Access now to see how AWS can deliver top-notch security, as well as facilitate an adaptive environment armed with the actionable insights needed to help thwart and prevent future threats.
Posted: 30 Aug 2017 | Published: 28 Jul 2017

Splunk

Cybersecurity — Whose Responsibility Is It?
sponsored by Armor
WHITE PAPER: Who is responsible for security in the enterprise? Learn how to determine roles and responsibilities, as well as policies and processes, to build a culture of security.
Posted: 30 Aug 2017 | Published: 31 Dec 2016

Armor

What iOS 11 Means to the Enterprise
sponsored by MobileIron
WHITE PAPER: Apple is pursuing a stronger foothold in the enterprise market with many new features and capabilities released in iOS 11. This paper will focus on three key enterprise upgrades and the role of enterprise mobility management (EMM) solutions in managing and deploying some of these new capabilities.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

MobileIron

Protecting Patient Data & Complying with HIPAA Security Regulations
sponsored by Trustwave
WHITE PAPER: Data protection is essential – particularly in the health industry. The Health Insurance Portability and Accountability Act (HIPAA) was enacted to protect Personal Health Information (PHI) of patients. Learn how to comply with HIPAA security regulations.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Trustwave

How To Meet The New Mandates For European Consumer Data
sponsored by Ivanti
WHITE PAPER: Take an in-depth look at this white paper to reveal how you can meet GDPR requirements and strengthen your data protection strategy.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Ivanti

2017 Network Security Report
sponsored by Ixia
WHITE PAPER: Read this network security report to gain some insight into how the landscape has changed over the past year, and learn some tips as to how you can better secure your network.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

Ixia

Top Areas to Look for in Data Protection Tools
sponsored by Dell EMC and Intel®
WHITE PAPER: We are entering an era where data is your most valuable asset. You need a data protection tool to ensure that your data stays yours. This white paper gives you 8 key focus areas to evaluate when making your data protection decision.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

Dell EMC and Intel®

Making Cloud Work for Business
sponsored by NTT Communications Corporation
WHITE PAPER: Download this resource to learn how in just 5 short steps, you can take ahold of your cloud initiative, and overcome the biggest barrier to adoption—security.
Posted: 28 Aug 2017 | Published: 31 Dec 2016

NTT Communications Corporation

The Cloud Evolution: Top Security Challenges & How to Overcome Them
sponsored by AWS-Trend Micro
WHITE PAPER: Leverage Deep Security on AWS to adopt a DevSecOps culture, so your IT team can spend less time focusing on security and more developing your core business applications.
Posted: 24 Aug 2017 | Published: 25 Jul 2017

AWS-Trend Micro

Eliminating Access Blind Spots
sponsored by RSA
WHITE PAPER: 63% of data breaches involve compromised identities, according to the 2017 Verizon DBIR. Uncover how to enhance your security posture with multi-factor authentication that can mitigate potential risks prior to them causing trouble.
Posted: 24 Aug 2017 | Published: 24 Aug 2017

RSA

6 Key Steps to Successful Identity Assurance
sponsored by RSA
WHITE PAPER: Uncover guidance on the six key elements to identity assurance and how to increase security while optimizing the end user's experience. Learn how to deliver access to users that's both convenient and secure.
Posted: 24 Aug 2017 | Published: 24 Aug 2017

RSA

Risk-Driven Identity And Access Management Process Framework
sponsored by RSA
WHITE PAPER: Access this Forrester Research report to learn how a risk-based IAM strategy can help you to identify threats and insecure behaviors early on, and defend against them more efficiently.
Posted: 23 Aug 2017 | Published: 06 Jan 2017

RSA

Are You a Proxy Pro? Put Yourself to the Test
sponsored by Symantec
WHITE PAPER: ProxySG consolidates a broad feature-set to authenticate users, filter web traffic, identify cloud application usage, and provide data loss prevention and more. Check out these key capabilities you should leverage on your Blue Coat Proxy.
Posted: 23 Aug 2017 | Published: 31 Dec 2016

Symantec

Preventing Known and Unknown Threats
sponsored by OPSWAT inc
WHITE PAPER: Preventing known and unknown threats is essential for boosting security platforms. Read this white paper to take an in-depth look at the advantages and disadvantages of single-malware products vs. the value of multi-scanning.
Posted: 22 Aug 2017 | Published: 22 Aug 2017


App-Centric Security — Meeting the Needs of the Modern Mobile Enterprise
sponsored by Blue Cedar
WHITE PAPER: IT security executives must constantly assess the best ways to secure mobile devices. Check out this white paper to learn about strategies to increase your mobile security posture.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Blue Cedar

Protecting Data in the Healthcare Industry
sponsored by Mimecast
WHITE PAPER: The healthcare industry finds itself under cyberattack from many vectors, including ransomware, malware and targeted attacks. Read this white paper to determine strategies to secure your data.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Mimecast

Hosting: The Strategic Decision SMBs Should Take More Seriously
sponsored by Codero
WHITE PAPER: You need to invest in a hosting service to keep your SMB up and running, but which kind of service do you utilize? This white paper breaks down the process of making a hosting choice and discusses why you need to approach this as a strategic decision.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Codero

Data Loss Prevention – Now with CASB
sponsored by Symantec
WHITE PAPER: Data is often maliciously targeted through cloud applications. This resource will help you determine strategies for using DLP and CASB to protect your company in the cloud.
Posted: 22 Aug 2017 | Published: 31 Dec 2016

Symantec

Secure Your VDI If You Don't Wanna Cry Again
sponsored by Citrix Ready
WHITE PAPER: Virtual desktop infrastructures (VDIs) are a popular option for those looking to connect and work with their data from anywhere in the world. It would be easy enough for WannaCry to piggyback its way into your system. This upcoming webcast will teach you how to protect your virtualized environment and key best practices for doing so.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Citrix Ready

Web Hacking - Network Security Secrets & Solutions
sponsored by Bit9, Inc.
WHITE PAPER: This chapter seeks to outline the scope of the webhacking phenomenon and show you how to avoid becoming just another statistic in the litter of web properties that have been victimized over the past few years.
Posted: 28 Aug 2017 | Published: 09 Jun 2009

Bit9, Inc.
51 - 75 of 1878 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement