IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
51 - 75 of 1724 Matches Previous Page  |  Next Page
Case Study: State Agency Bolsters Security & Operational Efficiencies
sponsored by Splunk
WHITE PAPER: This case study describes how the Nevada Department of Transportation enhanced its security and its efficiency with better log management.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Splunk

Why Application Whitelisting Is Essential For Advanced Threat Defense
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript explores the challenge of securing your endpoints from zero-day attacks and suggests application whitelisting as a solution.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Digital Guardian

Content Is the New Perimeter: The Security and Regulatory Drivers for IRM
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper discusses the challenges of securing digital information, even when that information resides outside the perimeter.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

IntraLinks, Inc

Don'€™t Jeopardize Security When Moving to Office 365
sponsored by McAfee, Inc.
WHITE PAPER: Access this expert white paper to discover the security risks related to the migration to Office 365 and other cloud-based applications. Also, learn how to avoid these risks with a comprehensive security solution.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

McAfee, Inc.

The ESG Cybersecurity Maturity Model
sponsored by Hewlett-Packard Company
WHITE PAPER: Based on their research, Enterprise Strategy Group has developed a cyber security maturity model that classifies organizations as basic, progressing, or advanced.
Posted: 18 Aug 2015 | Published: 22 Oct 2014

Hewlett-Packard Company

The State Of Data Security: 2014 Through 2015
sponsored by Digital Guardian
WHITE PAPER: In this webinar transcript, a Forrester researcher discusses the state of data security, how things have changed in the past year, and what can be done going forward.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Digital Guardian

When Do Managed Security Services Makes Sense?
sponsored by Digital Guardian
WHITE PAPER: This resource discusses the benefits of investing in security services and helps you determine whether security services are the right choice for you.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Digital Guardian

Obtaining Network Information for Successful Security
sponsored by Splunk
WHITE PAPER: This white paper discusses how advanced network monitoring technologies can help you detect even the subtlest attacks.
Posted: 17 Aug 2015 | Published: 31 Dec 2014

Splunk

Secure Remote Data Collection for Better Data Use
sponsored by Splunk
WHITE PAPER: This white paper describes how a secure method of remote data collection can enable your enterprise to better analyze and leverage all the data in your network, not just the data generated in a central location.
Posted: 17 Aug 2015 | Published: 31 Dec 2014

Splunk

A Big Data Approach to Enterprise Security
sponsored by Splunk
WHITE PAPER: This white paper discusses how big data can help you obtain a more advanced level of threat intelligence that can detect new forms of malware.
Posted: 17 Aug 2015 | Published: 31 Dec 2012

Splunk

SSL Decryption: Uncovering The New Infrastructure Blind Spot
sponsored by Gigamon
WHITE PAPER: This white paper makes the case for adopting SSL decryption to protect your enterprise.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Gigamon

A Simple Guide to Successful Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This white paper discusses the importance of penetration testing and presents six steps to doing it effectively.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Core Security Technologies

Managing Threats and Remediating Risk for State of Vermont Applications
sponsored by Core Security Technologies
WHITE PAPER: In this case study, the Vermont state government struggles to detect and mitigate all vulnerabilities in the applications that handle its sensitive data.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Core Security Technologies

Research Infographic: Moving Enterprise Applications to the Cloud
sponsored by IBM
WHITE PAPER: This infographic provides recent insights from the research firm Pierre Audoin Consultants (PAC) on how to orchestrate a successful cloud migration. Read on to learn about the importance of infrastructure management services and the benefits of cloud managed services.
Posted: 17 Aug 2015 | Published: 31 Jul 2014

IBM

Five Critical Questions You Should Be Asking SIEM Vendors
sponsored by Splunk
WHITE PAPER: This white paper examines one solution that provides agile threat response via a combination of pre-built data views and ad hoc analysis. Read on here to find out how to and cultivate the knowledge of your security practitioner by asking questions of potential vendors.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Splunk

Business Drivers for Next Generation Authentication
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper discusses how today's complex authentication environment impacts users and IT professionals alike, and how you can lessen these impacts without lessening security.
Posted: 14 Aug 2015 | Published: 31 Dec 2014

SafeNet, Inc.

Splunk® and Amazon Web Services (AWS)
sponsored by Splunk
WHITE PAPER: This white paper highlights a solution that offers real-time visibility into cloud management, infrastructure, and applications. Read on to learn how you can monitor AWS using this solution or deploy it directly within the AWS environment so you can gain insight into your AWS activity.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Splunk

Adapt Your Security to Today's Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper discusses why changes in security strategies are necessary and how you can make these changes.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Digital Guardian

A Zero-Day Agnostic Approach to Defending Against Advanced Threats
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript discusses how information security products have changed and why these changes are essential for tackling advanced threats.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Digital Guardian

Technology for Simplified SOC Creating
sponsored by Splunk
WHITE PAPER: This white paper discusses the importance of an SOC and gives suggestions for implementing technology that simplifies the process of SOC creation.
Posted: 14 Aug 2015 | Published: 31 Dec 2014

Splunk

Achieving Data-Drive Security Intelligence
sponsored by Splunk
WHITE PAPER: This white paper discusses how you can obtain the kind of data-driven security that's needed for combatting today's advanced threats.
Posted: 14 Aug 2015 | Published: 31 Dec 2014

Splunk

The Evolution of Ransomware
sponsored by Symantec Corporation
WHITE PAPER: The white paper gives you an extensive look at the origins, development, and functioning of ransomware.
Posted: 14 Aug 2015 | Published: 06 Aug 2015

Symantec Corporation

State of Security Operations
sponsored by Hewlett-Packard Company
WHITE PAPER: With businesses recognizing the need for further investment in cyber-defense, it is essential to figure out which tools and strategies are best for your organization. Read now and find out more about the current state of security operations in 2014.
Posted: 14 Aug 2015 | Published: 31 Jan 2014

Hewlett-Packard Company

Advanced Threat Detection and Response
sponsored by Splunk
WHITE PAPER: This white paper explains how to detect advanced threat activity from both the host and the network perspectives and advises on several solutions to combat these threats.
Posted: 13 Aug 2015 | Published: 13 Aug 2015

Splunk

Financial MDM: Bringing Secure BYOD to You
sponsored by IBM
WHITE PAPER: This white paper examines the growth of bring your own device (BYOD) culture in financial services, and outlines the host of security challenges IT finance departments face when implementing MDM. Click through to address your financial mobility concerns with a cloud-based solution.
Posted: 13 Aug 2015 | Published: 31 Dec 2014

IBM
51 - 75 of 1724 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement