IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
76 - 100 of 1631 Matches Previous Page  |  Next Page
2015 Cost of Data Breach Study: United Kingdom
sponsored by IBM
WHITE PAPER: This report analyzes the financial cost of cybercrime in the UK, discussing how much harm a hack can cause and what the implications are for your business.
Posted: 13 Jul 2015 | Published: 31 May 2015

IBM

Gartner Security & Risk Management Summit 2015: Schedules, Speakers, and More
sponsored by Gartner
WHITE PAPER: Access the following brochure to learn about the various topics, schedules, and strategies that will be covered during this year's Gartner Security and Risk Management Summit. Read on to learn will be speaking, future technology predictions, and more.
Posted: 13 Jul 2015 | Published: 13 Jul 2015

Gartner

Cloud Security Concerns and the Perceived Effectiveness of Traditional Security Solutions in a Cloud Environment
sponsored by CloudPassage
WHITE PAPER: The report presents research from a survey of high-level security professionals at major North American organizations on their attitudes toward cloud security, key adoption drivers, and the effectiveness of traditional security solutions in cloud environments.
Posted: 13 Jul 2015 | Published: 30 Jun 2015

CloudPassage

The State of Point-of-Sale Insecurity
sponsored by SurfWatch Labs
WHITE PAPER: This report analyzes the state of PoS compromises and other sources of online credit card theft in order to provide suggestions on combatting this kind of cybercrime.
Posted: 10 Jul 2015 | Published: 30 Jun 2015

SurfWatch Labs

Create Your Own Private ISAC: Tips for Sharing Threat Intelligence
sponsored by SurfWatch Labs
WHITE PAPER: This white paper discusses how cybersecurity professionals can build an information sharing and analysis center (ISAC) to disseminate security intelligence and insights among partners.
Posted: 10 Jul 2015 | Published: 10 Jul 2015

SurfWatch Labs

Unified Security Management vs. SIEM: A Technical Comparison
sponsored by AlienVault
WHITE PAPER: This white paper explores why SIEM solutions have been proven to be less effective than their vendors claim.
Posted: 10 Jul 2015 | Published: 10 Jul 2015

AlienVault

Lab Review: What is Needed for Virtual Environment Data Security?
sponsored by IBM
WHITE PAPER: In this white paper, a product that claims to protect data in virtual environments is tested to reveal its capabilities.
Posted: 09 Jul 2015 | Published: 31 Aug 2014

IBM

Case Study: Ensuring Data Management and Security, Regardless of Volume
sponsored by IBM
WHITE PAPER: In this white paper, discover how a major research database ensured data protection and efficient management despite its large data volume.
Posted: 09 Jul 2015 | Published: 31 Mar 2015

IBM

IBM X-Force Threat Intelligence Quarterly, 2Q 2015
sponsored by IBM
WHITE PAPER: This quarterly cyber security report describes just how prevalent insider threats are and gives you guidelines on how to best protect yourself from them.
Posted: 09 Jul 2015 | Published: 30 Jun 2015

IBM

Your New EMM Platform
sponsored by BlackBerry
WHITE PAPER: Download this white paper to discover an enterprise mobility management (EMM) platform that manages all aspects of your mobile environment – including device, app, and security. Also, learn about a migration strategy to help you move to this platform.
Posted: 09 Jul 2015 | Published: 31 Dec 2014

BlackBerry

Hidden Dangers Lurking in E-Commerce
sponsored by Symantec Corporation
WHITE PAPER: This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules.
Posted: 08 Jul 2015 | Published: 08 Jul 2015

Symantec Corporation

The Holistic Approach To Preventing Targeted Attacks
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This white paper analyzes exactly what happened during the Target hack so you can know how to avoid Target's fate.
Posted: 08 Jul 2015 | Published: 08 Jul 2015

BAE Systems Applied Intelligence (formerly SilverSky)

Navigating the Pitfalls of Attack Prevention: A Look at Employee Perception
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This report takes a look at an employee's perspective on why enterprise security measures are not where they should be, and what could be done to advance them.
Posted: 08 Jul 2015 | Published: 31 Dec 2014

BAE Systems Applied Intelligence (formerly SilverSky)

Six Golden Rules for Selecting an SSL or TLS Certificate
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides an overview of the SSL certificate market, the 6 golden rules of purchasing SSL certificates, and more.
Posted: 08 Jul 2015 | Published: 31 Dec 2014

Symantec Corporation

IBM 2015 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This cybercrime report provides data on the sources and frequency of cybercrime so you know what to protect yourself from.
Posted: 08 Jul 2015 | Published: 31 May 2015

IBM

The Top 10 TLS/SSL Client, Server, and Application Best Practices
sponsored by Symantec Corporation
WHITE PAPER: This whitepaper provides an in-depth breakdown of the top 10 TLS/SSL client, server and application best practices.
Posted: 08 Jul 2015 | Published: 08 Jul 2015

Symantec Corporation

Goodbye to Windows Server 2003. Hello HP. Successfully migrate to the New Style of IT
sponsored by HP
WHITE PAPER: Read this transcript for five considerations that will convince you to migrate from Windows Server 2003.
Posted: 08 Jul 2015 | Published: 08 Jul 2015

HP

Website Security Threat Report Part 3
sponsored by Symantec Corporation
WHITE PAPER: Download part 3 of this Website Security Threat Report to discover how the public made criminal's lives easier in falling for the latest social media attacks and online scams. Plus, take an invaluable look ahead and benefit from our security recommendations and best practices.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Cybersecurity: The New Agenda
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: In this white paper, recognized security expert Jim Anderson discusses how organizations need to change in order to protect themselves in the new threat landscape.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

BAE Systems Applied Intelligence (formerly SilverSky)

How to Best Operationalize Threat Intelligence
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This white paper gives tips on how to implement and manage threat intelligence as effectively as possible.
Posted: 07 Jul 2015 | Published: 31 Dec 2014

BAE Systems Applied Intelligence (formerly SilverSky)

Website Security Threat Report Part 2
sponsored by Symantec Corporation
WHITE PAPER: Download part 2 of this Website Security Threat Report for the latest on the fast-evolving world of targeted attacks - from cyber espionage tactics to denial of service, spear-phishing and watering hole attacks.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Website Security Threat Report Part 1
sponsored by Symantec Corporation
WHITE PAPER: This website security threat report will give enterprises, small businesses and consumers essential information to help secure their systems from threat vulnerabilities. Continue reading to access emerging trends in attacks, malicious code activity, phishing, and spam.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Fast Detection & Deep Understanding: Responding Effectively to Cyber Attacks
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This white paper discusses the importance of the relationship between threat identification and security intelligence, and gives tips on how you can improve both of these factors.
Posted: 07 Jul 2015 | Published: 31 Dec 2013

BAE Systems Applied Intelligence (formerly SilverSky)

Automating 401K Support Systems to Provide Better Customer Service and Accommodate Growth
sponsored by Progress
WHITE PAPER: Tokio Marine introduced an image workflow process that included a Business Rules Management System to automate various rules. Read this white paper to learn about the benefits Tokio Marine reaped.
Posted: 06 Jul 2015 | Published: 31 Jul 2014

Progress

Streamlining and Securing Email Infrastructure
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This white paper details how United Airlines was able to secure and streamline its email messaging infrastructure, giving their staff secure access to email at home and on the road.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

BAE Systems Applied Intelligence (formerly SilverSky)
76 - 100 of 1631 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement