IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
76 - 100 of 1705 Matches Previous Page  |  Next Page
Definitive Guide: Securing the Mobile Enterprise
sponsored by Aruba Networks
WHITE PAPER: While mobility and IoT offer potential rewards for organizations the thought of all of these unknown devices connecting to the network can be worrisome for security and IT managers This informational white paper offers an outline for the pre-planning and deployment steps needed to help guide you on your journey of enterprise BYOD and IoT.
Posted: 15 Jul 2016 | Published: 15 Jul 2016

Aruba Networks

AWS Cautionary Tales and How to Avoid Becoming One
sponsored by Palerra Inc.
WHITE PAPER: AWS can provide a number of security concerns for enterprises, and knowing the pitfalls and possible solutions to them can prove to be invaluable knowledge. Explore real-life cautionary tales of the dangers that AWS can provide, and ways to mitigate these cloud threats.
Posted: 14 Jul 2016 | Published: 14 Jul 2016

Palerra Inc.

Salesforce Shield for Healthcare
sponsored by Salesforce.com
WHITE PAPER: Learn how healthcare organizations can secure protected health data in the cloud while meeting compliance and governance requirements.
Posted: 14 Jul 2016 | Published: 14 Jul 2016

Salesforce.com

Mobile Threat Prevention Behavioral Risk Analysis
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover what it means to have an advanced approach to comprehensive mobile security. Learn how you can closely monitor new or updated apps installed on the device, use app reputation to eliminate malware false-positives, and more.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Check Point Software Technologies Ltd.

A CISO’s Guide to Mobile Threat Prevention
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover the 5 major threats to mobile security, an in-depth analysis of their methods, best practices to prevent them, and how to stop mobile attacks before they start.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Check Point Software Technologies Ltd.

Hackers Are Poised to Compromise Your Communications Networks
sponsored by MASERGY
WHITE PAPER: VoIP technology has introduced new security concerns to the enterprise. Access this white paper now to learn about today's 9 most serious security concerns introduced by VoIP, and how to counteract them.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

MASERGY

Pairing SuccesFactors with a HCM Suite to Introduce Innovation to HR Operations
sponsored by Accenture
WHITE PAPER: Explore how SAP SuccessFactors users can leverage a modern HCM suite to enhance productivity, reduce costs, improve HR operations, transfer data sets securely between systems in the cloud, and more.
Posted: 13 Jul 2016 | Published: 31 Dec 2015

Accenture

Mobility In Government Services: A Checklist Towards Regulatory Compliance
sponsored by BlackBerry
WHITE PAPER: Discover the struggles faced by the mobile solutions used by government organizations and not only why compliance is so challenging, but also why it's vitally important.
Posted: 12 Jul 2016 | Published: 12 Jul 2016

BlackBerry

How to get the best protection from your CASB
sponsored by Palerra Inc.
WHITE PAPER: Discover how two approaches to a Cloud Access Security Broker (CASB) strategy stack up to the major concerns CISOs face on a daily basis, such as sharing security responsibilities with their cloud provider, taming unmanaged traffic from their network, and more.
Posted: 12 Jul 2016 | Published: 12 Jul 2016

Palerra Inc.

Comprehensive Protection from Advanced Threats Requires Mobile Threat Assessment
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover how a mobile threat assessment strategy can provide comprehensive protection against the most vicious and perfidious mobile attacks. Also learn of the myriad attack vectors that threaten mobile devices today, employee involvement in protection, and more.
Posted: 11 Jul 2016 | Published: 31 Mar 2016

Check Point Software Technologies Ltd.

Demystifying Mobile Security Attacks
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover the most common types of mobile attacks – Android malware apps, iOS surveillance, MITM, and more – and what you can do in order to detect and prevent them from causing damage.
Posted: 11 Jul 2016 | Published: 30 Mar 2015

Check Point Software Technologies Ltd.

Mobility In Financial Services: A Regulatory Compliance Checklist
sponsored by BlackBerry
WHITE PAPER: Discover a checklist towards regulatory compliance on achieving regulatory compliance for mobility/EMM initiatives. Uncover key considerations, such as: what questions you should be asking your RFP/RFQ to EMM vendors, understanding who the key regulators are and their areas of interest, and more.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

BlackBerry

Can a CASB Protect You from the 2016 Treacherous 12?
sponsored by Palerra Inc.
WHITE PAPER: Is a Cloud Access Security Broker (CASB) solution ideal for your enterprise's cloud security needs? Discover how CASBs provide a variety of advantages, uncover a step-by-step comparison of a CASB solution to the "Treacherous 12" threats identified by the Cloud Security Alliance, and more.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

Palerra Inc.

The Top Five Security Threats to Your Business
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Cyber security breaches are more common now than they have ever been. And the risks they present are all serious. This infographic details the top five security threats to your business and highlights a network-based security solution that protects against them.
Posted: 08 Jul 2016 | Published: 30 Jun 2016

Level 3 Communications, Inc.

Network Security Playbook Guide
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Successful enterprises deal with network security threats quickly and efficiently by relying on network security playbooks. Access this white paper that explains how to build your playbook and highlights a security platform that can be crucial to your network security.
Posted: 08 Jul 2016 | Published: 01 Jun 2016

Level 3 Communications, Inc.

Reduce the Threat Attack Surface with Prescriptive and Actionable Data
sponsored by BMC
WHITE PAPER: What disconnected security and operations teams need is unprecedented visibility into their environment's threat stature. Learn how to bridge the so-called "SecOps gap" by prioritizing risks and reducing your overall attack surface.
Posted: 07 Jul 2016 | Published: 07 Jul 2016

BMC

Breakthrough Security and Compliance Practices for the Digital Enterprise
sponsored by BMC
WHITE PAPER: A comprehensive, aggressive automation strategy helps to sustain a high level of security and compliance. Discover ways to make automation a strategic asset in the fight against cyberthreats.
Posted: 05 Jul 2016 | Published: 05 Jul 2016

BMC

3 Steps to Taking Control of SaaS Apps
sponsored by Palo Alto Networks
WHITE PAPER: In this tech brief, you'll find a quick 3-step guide to get SaaS under control and prevent threats.
Posted: 01 Jul 2016 | Published: 01 Jul 2016

Palo Alto Networks

Successfully Migrating Personnel Data from SAP ERP Human Capital Management to Employee Central
sponsored by Accenture
WHITE PAPER: Before migrating personnel data to SAP's Employee Central, adjustments and modifications are necessary to legacy SAP ERP HCM data. This report introduces a solution that converts data for migration that focuses on quality, consistency, and protection against risk and errors.
Posted: 30 Jun 2016 | Published: 31 Dec 2015

Accenture

Interoperability and the Cloud in Connected Health
sponsored by CloudMine
WHITE PAPER: Learn how to conquer the interoperability, compliance, and security issues holding your organization back from leveraging cloud platforms to develop revolutionary applications.
Posted: 29 Jun 2016 | Published: 29 Jun 2016


A letter from the CEO: Connected Health Cloud Release
sponsored by CloudMine
WHITE PAPER: If you've been struggling to derive meaningful data insights, now you can with a HIPAA-compliant cloud solution that won't break the bank. It connects with big-data analytics platforms to help you gain a better understanding of patient data and take action to improve outcomes (all with impeccable threat detection capabilities).
Posted: 28 Jun 2016 | Published: 01 Mar 2016


Accelerating the Building, Managing, and Deployment of Healhcare Apps
sponsored by CloudMine
WHITE PAPER: Discover how your healthcare organization can build and manage mobile and Web apps that ensure data is compliant and secure.
Posted: 28 Jun 2016 | Published: 04 Mar 2016


10 Ways to Save Money and Provide More Comprehensive Availability Protection in SQL Server Environments
sponsored by SIOS Technology Corp
WHITE PAPER: Check out this informative resource to uncover the 10 ways to save big on high availability protection for SQL Server environments.
Posted: 28 Jun 2016 | Published: 15 Apr 2014

SIOS Technology Corp

Health Care Security Is Personal: Act Now to Protect Patient Care
sponsored by Optum
WHITE PAPER: In this white paper, learn how healthcare organizations can successfully manage vulnerabilities in today's ever-evolving threat landscape. Inside, uncover how to identify, prioritize, prevent, and respond to new threats without impeding the flow of communications between patients, clinicians, admins, and 3rd party organizations.
Posted: 24 Jun 2016 | Published: 24 Jun 2016

Optum

Your Guide to Secure Access Architecture
sponsored by Fortinet, Inc.
WHITE PAPER: Evolving changes in mobile usage, devices, and applications create an enormous challenge for IT to protect the network. Explore ways to enable a secure network access architecture that helps keep internal enterprise assets safe, and protects users from cyberattacks.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Fortinet, Inc.
76 - 100 of 1705 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement