IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
51 - 75 of 1673 Matches Previous Page  |  Next Page
Status Quo Creates Security Risk
sponsored by ServiceNow
WHITE PAPER: Discover what 184 IT pros think are the most important factors that lead to incident response excellence, such as security and IT tool integration, the ability to know whether a security incident impacts a critical system and strong collaboration between the incident response and IT operations teams.
Posted: 27 Jan 2017 | Published: 29 Feb 2016

ServiceNow

Bringing IT and Security Together for Better Security Response
sponsored by ServiceNow
WHITE PAPER: Security response today is too slow and complex. Learn how to give your enterprise more efficient and timely security response, a streamlined path to remediation, and peace of mind that important assets are secure.
Posted: 27 Jan 2017 | Published: 27 Jan 2017

ServiceNow

How to Secure Your Mainframes in Today's Threat Landscape
sponsored by Thycotic
WHITE PAPER: Discover modern mainframe security best practices and how to protect yours from today's threats and developments such as the loss of skilled mainframe administrators and compliance requirements and the difficulty of auditing the mainframe environment.
Posted: 27 Jan 2017 | Published: 27 Jan 2017

Thycotic

Mobile Security: The Case for Enterprise Mobility Management
sponsored by Freudenberg IT
WHITE PAPER: Without a dynamic Enterprise Mobility Management (EMM) strategy in place, your company data risks being lost, stolen or otherwise compromised. Learn about the importance of establishing an EMM strategy and explore the multi-level approach your company may need to employ to ensure all your security and compliance demands are met.
Posted: 27 Jan 2017 | Published: 17 Jan 2017

Freudenberg IT

HPE Enterprise Secure Key Manager Best Practices
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn how to use the HPE Enterprise Secure Key Manager. The HPE Enterprise Secure Key Manager environment will provide an effective and secure repository for your encryption keys environment.
Posted: 26 Jan 2017 | Published: 26 Jan 2017

Hewlett Packard Enterprise

6 Tips to Maximize Productivity with Identity-as-a-Service (IDaaS)
sponsored by Microsoft
WHITE PAPER: Identity-as-a-Service (IDaaS) is an emerging strategy for managing and simplifying access to apps, but there are a number of feature, architecture and maturity considerations when selecting an IDaaS. Learn the top six considerations to keep in mind when selecting your IDaaS.
Posted: 26 Jan 2017 | Published: 22 Jun 2015

Microsoft

Encryption Key Management Best Practices
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn how enterprise encryption key management is fundamentally changing alongside data centers and applications, as well as how to prepare your organization for this revolution in design, function, and efficiency.
Posted: 26 Jan 2017 | Published: 27 Sep 2016

Hewlett Packard Enterprise

A Practical Guide to Efficient Security Response
sponsored by ServiceNow
WHITE PAPER: Discover why it takes so long for organizations to discover when they have been breached. Learn how to mitigate, remediate, and recover faster.
Posted: 26 Jan 2017 | Published: 26 Jan 2017

ServiceNow

How GDPR Compliance Can Drive Business Growth and Increase Value
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Learn how to mitigate risk and derive business value as you take on the EU GDPR. Gain access to a comprehensive guide to GDPR, multiple GDPR-related videos, and a breakdown of how to achieve GDPR compliance.
Posted: 26 Jan 2017 | Published: 26 Jan 2017

Hewlett-Packard Enterprise

Data Protection and Encryption Driven by GDPR Compliance
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Discover how to manage customized encryption keys, particularly at high volumes, while minimizing overhead costs. Learn how "one size fits all" encryption might not be the best for your company, and what role your encryption can play in GDPR compliance.
Posted: 25 Jan 2017 | Published: 31 Aug 2016

Hewlett-Packard Enterprise

The Ultimate Guide to Preventing Web Scraping
sponsored by Distil Networks
WHITE PAPER: It is estimated that 46% of all web activity is now down to bots. There are good and bad bots but web scrapers are in a gray area. Discover the issues around web scrapers and what can be done to control their activity.
Posted: 24 Jan 2017 | Published: 30 Dec 2016

Distil Networks

Worldwide DDoS Attacks & Protection Report
sponsored by Neustar
WHITE PAPER: Learn more about today's DDoS landscape, running trends, lessons learned from previous attacks, and what you can do to protect your company.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

Neustar

DDoS Attack Cybersecurity for 2017
sponsored by Neustar
WHITE PAPER: Learn about the modern DDoS landscape, what to expect from future trends, and how to keep the lessons learned from last year's attacks primed and ready to keep your organization safe.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

Neustar

Beyond Prevention: Cisco’s Next Generation Endpoint Security
sponsored by Cisco
WHITE PAPER: Discover how a continuous approach to endpoint security plus a big data architecture can enable key areas of transformative innovation in the battle against advanced threats that target the endpoint.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

Cisco

How to Speed Up Your Breach Detection Rate
sponsored by Cisco
WHITE PAPER: Learn how to reduce time to breach detection and increase detection rate. Discover how to reduce the space and time attackers have to harm your organization.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

Cisco

Six Tools Users Need for Mobile Files and How to Provide Them Securely
sponsored by BlackBerry
WHITE PAPER: Sharing files on a mobile device can pose many challenges. This white paper identifies and details the 6 tools users need for mobile files and outlines what you should consider in evaluating these solutions.
Posted: 23 Jan 2017 | Published: 14 Oct 2016

BlackBerry

Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware
sponsored by BlackBerry
WHITE PAPER: With destructive malware ravaging the networks of governments, Aramco, Sands Corporation, and Sony Pictures, you need to adjust your tactics to ensure your continued safety. In this white paper, discover a deeper look at these recent attacks and potential countermeasures to thwart them.
Posted: 23 Jan 2017 | Published: 17 Oct 2016

BlackBerry

Reinventing Data Protection for Digital Transformation
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Uncover the strategies your organization can use to overcome the data complexities of the modern reality of data. Learn the growing importance of data as an asset, as well as the need for new data protection and management strategies fit for purpose.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

Hewlett-Packard Enterprise

Navigate Your Way Around Ransomware
sponsored by Barracuda Networks
WHITE PAPER: Gain valuable insight into how to prepare your organization's defense and disaster recovery policies for modern ransomware attacks. Take a closer look at how ransomware works, the most common variants that are active today, and 3 steps to recover from ransomware.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

Barracuda Networks

5 Tips for Choosing a Next-GenerationEndpoint Security Solution
sponsored by Cisco
WHITE PAPER: Learn 5 tips for choosing an endpoint security solution that will protect against the modern threat landscape and prevent a breach. Learn how to detect, block, and remediate advanced malware across all endpoints.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

Cisco

Security Everywhere: A Growth Engine for the Digital Economy
sponsored by Cisco
WHITE PAPER: Learn how security can become an enabler for businesses to take full and secure advantage of opportunities presented by new digital business models and the growing pervasiveness of the IoE.
Posted: 19 Jan 2017 | Published: 19 Jan 2017

Cisco

Reengineering The Internet for Stronger Network Security
sponsored by Neustar
WHITE PAPER: Discover how to make the internet safer, faster, and more efficient by tackling today's threats and mitigating website downtime, keeping your team calm and efficient.
Posted: 19 Jan 2017 | Published: 19 Jan 2017

Neustar

How Open Source Subscriptions Deliver Business Value
sponsored by Red Hat
WHITE PAPER: Transferring to open source software (OSS) requires careful guidance to ensure security and maximize ROI during execution. Access this white paper to learn what to look for in an OSS vendor to guide your transition and see what one company offers as part of their customer experience.
Posted: 19 Jan 2017 | Published: 30 Dec 2016

Red Hat

Cybersecurity as a Growth Advantage
sponsored by Cisco
WHITE PAPER: Learn why the belief that the primary purpose of cybersecurity is growth enablement is starting to take hold among senior finance and line-of-business executives.
Posted: 19 Jan 2017 | Published: 19 Jan 2017

Cisco

Cyber Security: How to Know What You Don't Know
sponsored by Presidio Networked Solutions
WHITE PAPER: What are the top risks to your organization? If you can't answer that, your data is at risk. Uncover a comprehensive cyber security strategy that fully protects your information assets and data.
Posted: 18 Jan 2017 | Published: 18 Jan 2017

Presidio Networked Solutions
51 - 75 of 1673 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement