IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
51 - 75 of 1653 Matches Previous Page  |  Next Page
SSL Traffic Management to Meet Your Needs
sponsored by Blue Coat Systems
WHITE PAPER: In this infographic, discover a tool that gives you the all the capabilities you need for effective traffic monitoring.
Posted: 09 Apr 2015 | Published: 28 Feb 2015

Blue Coat Systems

Advanced Threat Protection Lifecycle Defense
sponsored by Blue Coat Systems
WHITE PAPER: In this infographic, discover a method of advanced threat protection that fights every step of the advanced threat lifecycle.
Posted: 09 Apr 2015 | Published: 09 Apr 2015

Blue Coat Systems

Virtualized Desktops in Healthcare
sponsored by Imprivata
WHITE PAPER: Ensure a successful virtual desktop infrastructure (VDI) deployment by learning how to overcome the most common barriers, such as clinical adoption, high overhead costs, and meeting new authentication needs.
Posted: 09 Apr 2015 | Published: 20 Nov 2014

Imprivata

The State of Threat Intelligence in 2015
sponsored by AlienVault
WHITE PAPER: In this research report, discover how many organizations have successfully implemented threat intelligence and what benefits they're experiencing.
Posted: 08 Apr 2015 | Published: 28 Feb 2015

AlienVault

Strengthen your Next-Generation Malware Analysis
sponsored by Blue Coat Systems
WHITE PAPER: In this brief infographic, discover how malware analysis and content filtering can help you achieve advanced threat protection.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Blue Coat Systems

Under Threat or Compromise Every Detail Counts
sponsored by Blue Coat Systems
WHITE PAPER: This white paper breaks down the five essential steps of security management to help you create a more comprehensive defense suited for today's threat landscape.
Posted: 08 Apr 2015 | Published: 31 Aug 2014

Blue Coat Systems

2015 Cyberthreat Defense Report
sponsored by Blue Coat Systems
WHITE PAPER: This report, which focuses specifically on IT security management, uses research to reveal what areas of security you should turn your attention to.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Blue Coat Systems

Critical Factors in Endpoint Security
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Endpoints are the new security perimeter, and this means rethinking your endpoint security. This white paper will help you do so.
Posted: 08 Apr 2015 | Published: 31 Dec 2013

Dell, Inc. and Intel®

Integrating the Hybrid Cloud
sponsored by Talend
WHITE PAPER: Download the white paper by Computing Research, "Integrating the Hybrid Cloud", to learn what you can do to avoid integration hurdles and get the most out of investments in cloud technology.
Posted: 08 Apr 2015 | Published: 28 Feb 2015

Talend

Security Empowers Business
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover a way of creating security systems that are a proactive business asset, not a reactive way to slow the business down.
Posted: 07 Apr 2015 | Published: 31 May 2013

Blue Coat Systems

Security Analytics Moves to Real-Time Protection
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover a security analytics platform that works in real time.
Posted: 07 Apr 2015 | Published: 31 Jul 2014

Blue Coat Systems

Tablets That Work for Business
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this informative white paper to explore the four main concerns with tablets in work environments today. Find out how a new generation of Windows-based tablets is overcoming these concerns by providing IT with the security and management they are looking for with the on-demand access the end-user wants.
Posted: 07 Apr 2015 | Published: 29 Aug 2014

Dell, Inc. and Intel®

Developing a Network Infrsatructure to Support Cloud Computing
sponsored by Level 3 Communications, Inc.
WHITE PAPER: This white paper explains how to develop a network infrastructure that supports your cloud computing efforts.
Posted: 06 Apr 2015 | Published: 31 Dec 2014

Level 3 Communications, Inc.

Revolutionizing Advanced Threat Protection
sponsored by Blue Coat Systems
WHITE PAPER: This white paper suggests ways for you to create a comprehensive security system that works against today's complex threat landscape.
Posted: 06 Apr 2015 | Published: 31 Jul 2014

Blue Coat Systems

TOP 5 CRITICAL CAPABILITIES FOR YOUR MALWARE SANDBOXING STRATEGY
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover the top five criteria of effective malware sandboxing.
Posted: 06 Apr 2015 | Published: 31 Mar 2014

Blue Coat Systems

Building the Business Case for Tablets in the Enterprise
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper highlights the arguments for adopting tablets into your enterprise and explores the important benefits you can achieve through tablet adoption. Find out what features to look for in an enterprise tablet and discover an enterprise tablet option that meets these requirements for business-scale performance and functionality.
Posted: 06 Apr 2015 | Published: 06 Apr 2015

Dell, Inc. and Intel®

What's Your Next Security Move?
sponsored by FireEye
WHITE PAPER: This quick self-assessment will help you navigate to your next big security decision and create better protection against advanced attackers.
Posted: 06 Apr 2015 | Published: 31 Dec 2014

FireEye

Mission Critical Apps in the Cloud
sponsored by Level 3 Communications, Inc.
WHITE PAPER: This white paper explains why any company considering the cloud needs to closely consider network performance between users, applications and their cloud services.
Posted: 03 Apr 2015 | Published: 31 Dec 2014

Level 3 Communications, Inc.

Mobile App Reputation and Risk Management for Network Security
sponsored by Veracode, Inc.
WHITE PAPER: In this white paper, you'll discover a new solution to application risk management that provides detailed behavioral intelligence about mobile apps.
Posted: 03 Apr 2015 | Published: 03 Apr 2015

Veracode, Inc.

Case Study: Global Media Company Gains Stronger App Security
sponsored by Veracode, Inc.
WHITE PAPER: This white paper explains how one cloud-based service helped a global media and technology company regain full visibility and control of its mobile app perimeter, allowing the enterprise to more effectively assess the risk of its mobile apps and maintain control of its mobile footprint.
Posted: 03 Apr 2015 | Published: 03 Apr 2015

Veracode, Inc.

Security Vs. Innovation: Do CIOs have to choose?
sponsored by Red Hat
WHITE PAPER: This article shows how you can balance your need for business innovation and security by introducing a secure datacenter that allows for secure BYOD, cloud computing and more.
Posted: 03 Apr 2015 | Published: 31 Dec 2014

Red Hat

Security Reimagined: An Adaptive Approach for the Digital Age
sponsored by FireEye
WHITE PAPER: It's time to reimagine how we do security. This white paper shows you how with tips on creating an integrated, proactive security system designed for the cybercrime of today.
Posted: 03 Apr 2015 | Published: 31 Dec 2014

FireEye

Top Selection Criteria for an Anti-DDoS Solution
sponsored by Radware
WHITE PAPER: Access this white paper now for a comprehensive list of the questions you need to ask potential vendors before choosing their service.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

Radware

4 Ways DNS Can Enhance Online Traffic & Security
sponsored by Neustar®
WHITE PAPER: In this white paper, discover 4 ways to optimize your DNS for better business and tighter security.
Posted: 02 Apr 2015 | Published: 11 Nov 2013

Neustar®

Attack Mitigation Service
sponsored by Radware
WHITE PAPER: This comprehensive white paper provides an in-depth explanation of all of the latest cyber threats and explains the benefits of one potential cyber security solution.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

Radware
51 - 75 of 1653 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement