IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
76 - 100 of 1754 Matches Previous Page  |  Next Page
Leveraging Multi-factor Authentication to Power Protection
sponsored by Centrify Corporation
WHITE PAPER: According to Verizon's 2016 DBIR, 63% of confirmed data breaches last year involved weak, default or stolen passwords. In this e-book, discover how to leverage multi-factor authentication to power protection.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

How to Detect & Respond to a Petya Ransomware Attack
sponsored by AlienVault
WHITE PAPER: On June 27th 2017, a new "Petya-like" form of ransomware spread from Ukraine to wreak havoc around the globe, crippling thousands of computers. Access this white paper to learn the 5 things we know for sure about this new threat and 5 steps to can take to respond to it.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

AlienVault

6 Best Practices for Securing AWS Environments
sponsored by Centrify Corporation
WHITE PAPER: Discover how to extend key technologies like identity and access management (IAM) to the cloud for privileged access security (PAS) on AWS IaaS without increasing the risk of a data breach.
Posted: 28 Jun 2017 | Published: 31 Dec 2016

Centrify Corporation

6 Risks and Opportunities to Strengthen Security using IaaS
sponsored by Centrify Corporation
WHITE PAPER: The idea of a secure perimeter has moved beyond the data center. Organizations must create the secure perimeter around the users and their devices. Examine six common risks of the modern "perimeter-less" network, and uncover six opportunities to strengthen security using IaaS.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

6 Best Practices: Privileged Access Security for AWS
sponsored by Centrify Corporation
WHITE PAPER: This e-book dives into the top 5 security myths surrounding AWS. You will learn about the privileged access security model, why maintaining your current security and compliance is slowing down cloud adoption, and more.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

6 Best Practices: Privileged Access Security for AWS
sponsored by Centrify Corporation
WHITE PAPER: This infographic reveals 6 best practices for implementing and extending AWS security best practices to the cloud. Learn why you should Establish a common security model, consolidate identities, and 3 more ways to securely migrate a cloud environment.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

GDPR: Your Guide to Centralizing Unstructured Data Governance
sponsored by Commvault
WHITE PAPER: Your organization has only until May 2018 to comply with the GDPR or face up to €20 million, or 4% of your company's annual global revenue, in fines. Discover how to centralize unstructured data governance across on-premises and cloud in preparation for GDPR compliance.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Commvault

5 Way to Manage Mobility and IOT Risks
sponsored by Aruba Networks
WHITE PAPER: By 2020 there will be more people with a mobile phone than those with running water and a car. Securing those and other IoT devices is top priority for enterprises around the globe. Discover these 5 insightful tips to ensure IoT and mobile security for your organization.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Aruba Networks

Confronting Today's Advanced Email Threats
sponsored by Vircom
WHITE PAPER: Email is becoming one of the most favored attack surfaces used by malicious actors to harm your organization. Discover how to protect your enterprise from the growing number of sophisticated threats in today's threat environment.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Vircom

Securing the Evolving Enterprise Network: Inside and Out
sponsored by Aruba Networks
WHITE PAPER: What is tue current state of network security and how can it be improved? This paper from the Enterprise Strategy Group answers this by surveying current network security needs and the problems causing them, as well as why you should consider "closed-loop" network security.
Posted: 28 Jun 2017 | Published: 28 Apr 2017

Aruba Networks

Cybersecurity in the Age of Agile, DevOps, and AppDev
sponsored by Veracode, Inc.
WHITE PAPER: With cybersecurity becoming a chief issue among enterprises with high-profile attacks like WannaCry in the news, many enterprises are looking to shore up their defenses and mitigate vulnerabilities. Discover why app security (AppSec) is one of the leading issues.
Posted: 27 Jun 2017 | Published: 27 Jun 2017

Veracode, Inc.

Prevent Attacks, Don't React: Deploying a Preventative Security Model
sponsored by Comstor
WHITE PAPER: Discover how to implement a cloud-delivered, predictive security model that can block phishing attempts, bespoke malware, and other evolving threats from the moment attackers first start spinning up their attack infrastructure.
Posted: 27 Jun 2017 | Published: 27 Jun 2017

Comstor

Access Visibility and Security for Wired and Wireless Devices
sponsored by Aruba Networks
WHITE PAPER: The traditional network perimeter is a thing of the past. IT security pros need the right tools to tackle existing and unforeseen challenges. Discover a 3 step approach to securing your network and the growing number of devices on it.
Posted: 27 Jun 2017 | Published: 27 Jun 2017

Aruba Networks

Security Considerations for Next Generation Network Access and Endpoint Compliance
sponsored by Aruba Networks
WHITE PAPER: Endpoint compliance assessments are critical for today's mobile workforce environment. This white paper explains how and where next-generation endpoint compliance should be enforced, as well as additional considerations that are critical for ensuring a secure network.
Posted: 27 Jun 2017 | Published: 18 Mar 2016

Aruba Networks

Ransomware: Disaster-proof Your Data With an API
sponsored by Rubrik
WHITE PAPER: Many enterprises look to disaster recovery and backup to protect them (they can't ransom data you have a secure copy of), but that's easier said than done. Discover 6 backup tips to help protect your company from ransomware.
Posted: 27 Jun 2017 | Published: 27 Jun 2017

Rubrik

Endpoint Visibility: Prerequisite for Today's Security
sponsored by Aruba Networks
WHITE PAPER: With the billions of IoT devices expected to connect to networks in the next 3 years, and the well-publicized security breaches of late, there is a warranted demand among IT pros for real-time visibility and reporting. Learn how continuous monitoring and profiling of connected devices could be your ticket to modern endpoint security.
Posted: 26 Jun 2017 | Published: 26 Jun 2017

Aruba Networks

The Business Value of Securing and Authenticating Wireless and Wired Network Users
sponsored by Aruba Networks
WHITE PAPER: Network access control (NAC) is being largely seen as the answer to faster network security when it comes to dealing with the massive influx of mobile devices. This IDC report gives you what you need to plan your NAC strategy. You will get an overview of market trends, demographics, the business value a NAC system can help you realize, and more.
Posted: 26 Jun 2017 | Published: 29 Dec 2016

Aruba Networks

The Spectrum of Mobile Risk: Understanding the Full Range of Risks to Enterprise Data From Mobility
sponsored by Lookout
WHITE PAPER: Download this white paper to discover a mobile risk matrix that will help organizations understand the prevalence of mobile risk surrounding software vulnerabilities, mobile app threats, behavior and configurations and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Lookout

The Internet of Things: Posing Security Threats and Delivering Beyond Expectations
sponsored by Aruba Networks
WHITE PAPER: Not only are many early adopters struggling to secure IoT devices and apps, but many organizations disagree on what IoT means and how to extract value from it. Discover how different industries define, use, and benefit from IoT by creating "smart workplaces," increasing innovation, enhancing customer experiences, and more.
Posted: 23 Jun 2017 | Published: 31 Mar 2017

Aruba Networks

The Current State of Email Security
sponsored by Microsoft
WHITE PAPER: 83% of IT security managers cited email as a primary source of attack. Access this white paper to learn about the current state of email security, where you stand in relation to your peers, and how you can prepare for future attacks.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

Microsoft

Trust, Security, and Compliance in the Cloud
sponsored by Microsoft
WHITE PAPER: Security concerns are an important consideration for organizations as they contemplate moving to the cloud, yet these often overshadow the opportunities that might come from such a move. Learn how to attain trust, security, and compliance in the cloud and mitigate the risk that traditionally comes with the move.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

Microsoft

How to Turn Your Cloud Into a Security Vault
sponsored by Microsoft
WHITE PAPER: Is there a way to easily control user access and provide cyberthreat protection on the cloud? Learn how to reinforce your cloud's infrastructure to withstand attacks, and offer strong protection against malicious activity.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

Microsoft

Key Issues for E-Discovery and Legal Compliance
sponsored by Smarsh
WHITE PAPER: Managers are often worried their organizations will be sued at some point, but most aren't adequately prepared to deal with e-discovery issues. In this Osterman Research report, uncover insight from the results of an in-depth survey of decision makers and influencers at mid-sized and large organizations.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

Smarsh

8 Reasons to Consider SaaS-Based Infrastructure Monitoring
sponsored by LogicMonitor
WHITE PAPER: On-premise monitoring systems are struggling to keep up with new computing trends. This white paper discusses the eight central reasons to why you should consider SaaS for your infrastructure monitoring purposes.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

LogicMonitor

5 Steps to Eradicate Text Messaging Risk
sponsored by Smarsh
WHITE PAPER: Prohibiting the use of text messages in your organization does not protect you from risk - it simply hides it. Discover 5 steps on how to leverage text messaging more in your organization as a legitimate communication channel while reducing your organization's compliance, legal and reputational risk.
Posted: 21 Jun 2017 | Published: 21 Jun 2017

Smarsh
76 - 100 of 1754 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement