IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
51 - 75 of 1584 Matches Previous Page  |  Next Page
Clinical Segmentation Done Right
sponsored by Avaya
WHITE PAPER: Healthcare equipment is on the cutting edge of technology but is also vulnerable and open to attack. Access this white paper to discover 7 solutions that are provided by a software-defined network (SDN).
Posted: 28 Mar 2016 | Published: 09 Mar 2016

Avaya

How Integrated Services Reduce Risk and the Impact of a Security Breach to Organizations
sponsored by Dell SecureWorks
WHITE PAPER: This white paper presents the advantages of a single-outsourced solution for managed security services and incident response. Discover how combining your capabilities with an MSSP can enable you to improve your overall security by reducing investigation time with real-time data access and enhancing remediation solutions with cyberintelligence.
Posted: 25 Mar 2016 | Published: 25 Mar 2016

Dell SecureWorks

Top 5 IT Challenges Facing Canadian Businesses
sponsored by Rogers Communications, Inc.
WHITE PAPER: Business success increasingly hinges on a company's ability to use new technology to drive innovation and improve operational efficiency. But IT leaders say their ability to advance the business is challenged. Read this brief white paper to learn about the IT challenges facing businesses today and why IT departments are wasting 200 hours per week.
Posted: 25 Mar 2016 | Published: 08 Mar 2016

Rogers Communications, Inc.

Make More Money with Enterprise Mobility Suite Part 1
sponsored by Microsoft
WHITE PAPER: Enterprise mobility suite (EMS) is the next tool that is going to be making its mark on the business landscape. This white paper will teach you the basics of EMS, who it will benefit, and pain points that are being addressed.
Posted: 25 Mar 2016 | Published: 27 Nov 2015

Microsoft

Rapidly Detect and Respond to the Advanced and Evasive Threat
sponsored by Dell SecureWorks
WHITE PAPER: This white paper explores the benefits of combining advanced network and endpoint detection technology with the right people, processes and intelligence for greater visibility of threats.
Posted: 25 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

Dealing with Data Sovereignty in the Cloud Era
sponsored by VMware
WHITE PAPER: This white paper examines how you can gain back control of your data in the cloud era. Learn considerations for maintaining data sovereignty and security while future proofing your cloud strategy.
Posted: 24 Mar 2016 | Published: 24 Mar 2016

VMware

Protect Against Zero-Day Attacks at the Every Level
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: It's time to take threat defense to the next level and protect your organization. In this white paper, you'll uncover ways to combine OS-level sandboxing with threat prevention capabilities for integrated prevention and security management.
Posted: 24 Mar 2016 | Published: 24 Mar 2016

Check Point Software Technologies Ltd.

7 Key Questions to Ask When Selecting an Incident Response Service Provider
sponsored by Dell SecureWorks
WHITE PAPER: This white paper is designed to make you ask tough, direct questions of any incident response services provider to help you determine their capabilities.
Posted: 24 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

Securing mobile productivity for Microsoft Office 365
sponsored by IBM
WHITE PAPER: This white paper explains the importance of deploying and securing the Microsoft ecosystem across all mobile platforms, including Windows 10. Access now and start efficiently managing your enterprise productivity, connectivity and security in today's hostile mobile world.
Posted: 23 Mar 2016 | Published: 01 Feb 2016

IBM

SDN Expectations Report
sponsored by Avaya
WHITE PAPER: Many companies are in the process of adopting, or at least researching, software-defined networks (SDN). Access this report to discover the network problems companies are experiencing and their expectations as to whether SDN can solve them as well as, what is holding some companies back from adoption.
Posted: 23 Mar 2016 | Published: 24 Feb 2016

Avaya

The Platform of Platforms for the Internet of Things
sponsored by IBM
WHITE PAPER: How can you choose a comprehensive Internet of Things (IoT) platform out of all of the options on the market? Access this resource to discover the 5 key elements to an effective IoT platform, including application management, analytics, and 3 more.
Posted: 22 Mar 2016 | Published: 29 Feb 2016

IBM

Definitive eGuide: Mobility and IoT cuasing IT headaches? Connect and protect with Adaptive Trust
sponsored by Aruba Networks
WHITE PAPER: This white paper outlines the pre-planning and deployment steps needed to help guide you on your journey of enterprise BYOD and IoT. Learn how greater visibility and the integration of your policy decision engine with third-party security solutions can enhance your ability to offer end-to-end mobile protection.
Posted: 22 Mar 2016 | Published: 01 Feb 2016

Aruba Networks

Make Security Part of Your Client Systems Refresh
sponsored by Dell, Inc. and Intel®
WHITE PAPER: To address security challenges while sufficiently supporting business processes and modern workflows, your secure data strategy should keep up. Uncover an approach that is designed to help your organization protect, comply, and enable.
Posted: 21 Mar 2016 | Published: 21 Mar 2016

Dell, Inc. and Intel®

Market Overview: Customer Identity and Access Management Solutions
sponsored by Gigya
WHITE PAPER: How can you balance a seamless customer experience with a strong security strategy to protect customers' privacy? This Forrester report evaluates 7 customer identity and access management (CIAM) solution vendors, revealing the major strengths of each choice. Discover the key features to look for when deciding on a CIAM solution.
Posted: 21 Mar 2016 | Published: 04 Aug 2015

Gigya

Study Shows New Generation of IT Security Threats
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This report relays the importance of embracing both evolving workforce demands and more advanced, converged infrastructure. View now and learn how to prepare for the potential threats and vulnerabilities of BYOD and cloud technology, while increasing productivity and competitive advantage.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

Dell, Inc. and Intel®

Protecting your Endpoints from Cyber-Crime
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper discusses the increasingly sophisticated nature of today's modern threatscape. Discover secure, trusted strategies for significantly reducing the potential impacts of a threat, while keeping users productive and secure.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

Dell, Inc. and Intel®

The Secure Mobile Enterprise: Enabling Mobility while Controlling Risk
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Building a secure mobile enterprise requires a broad, scalable and integrated approach that manages and secures every aspect of mobility usage. To learn more about four essential components of such an enterprise and how to bring them to yours, access this white paper.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

Dell, Inc. and Intel®

Formulate a Game Plan for Closing the SecOps Gap
sponsored by BMC
WHITE PAPER: Access this report to discover why collaboration between security and operations (SecOps) will drive faster threat response, stronger security, and improved compliance in your organization. Take a closer look at the SecOps gap now, and learn the gravity of IT misalignment.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

BMC

Getting a handle on mobile devices – securely, reliably and tidily
sponsored by Matrix42
WHITE PAPER: Mobile access to data and applications is now the rule rather than the exception. This trend has notably spurred thegenesis of both web and SaaS applications, which are used on a daily basis by allcompanies of all sizes nowadays. This technological progress is confronting both IT professionals and ordinary users with new problems.
Posted: 18 Mar 2016 | Published: 30 Dec 2015

Matrix42

Network Virtualization Brings Agility to the Enterprise
sponsored by MASERGY
WHITE PAPER: A recent survey indicates that over 40% of CIOs surveyed plan to upgrade their WANs this year, and they cited networking as the area most in need of a refresh. Network function virtualization (NFV) is a significant innovation in network design and it comes at an opportune time. Can you boost your company's agility with NFV?
Posted: 17 Mar 2016 | Published: 08 Mar 2016

MASERGY

Guide to Delivering Rich Graphics on Virtual Desktops
sponsored by Dell, Inc.
WHITE PAPER: Inside this expert white paper, discover 3 architectural models for delivering rich graphics to virtual desktop environments. Find out how to deliver accelerated graphics for a variety of users and workloads, and the benefits of using VDI for rich graphics.
Posted: 17 Mar 2016 | Published: 17 Mar 2015

Dell, Inc.

Manufacturing: 2015 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This white paper offers a high-level overview of major threats trending across businesses worldwide over the past year. View now for insight into the current threat landscape for the manufacturing industry and offers solutions that can help you better protect your organization.
Posted: 16 Mar 2016 | Published: 31 Dec 2015

IBM

Report: Modern Threat Intelligence
sponsored by IBM
WHITE PAPER: The complexities of doing business at scale, both strategic and technical, create barriers in preventing breaches. Uncover ways to focus on user education and systematic protocols for operating a strong risk assessment program, allowing you to overcome these barriers.
Posted: 15 Mar 2016 | Published: 29 Feb 2016

IBM

Covering the Security Aspect of Software Asset Management
sponsored by Snow Software
WHITE PAPER: Managing large amounts of business critical information requires a high level of security. Access this white paper and uncover critical features in software asset management that prevent unauthorized access and destructive attacks.
Posted: 14 Mar 2016 | Published: 09 Dec 2015

Snow Software

Overcome the Attacker Advantage with McAfee Endpoint Security 10
sponsored by Intel Security
WHITE PAPER: This white paper shows you how to respond and manage the threat defense lifecycle and a provide collaborative, extensive framework to reduce the complexity of conventional multivendor environments.
Posted: 25 Mar 2016 | Published: 31 Dec 2015

Intel Security
51 - 75 of 1584 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement