IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
SecurityWhite Papers (View All Report Types)
76 - 100 of 1353 Matches Previous Page  | Next Page
Stopping Malicious Botnets
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
Posted: 11 Apr 2014 | Published: 30 Nov 2012

Hewlett-Packard Limited

Simplify and Consolidate Data Protection for Better Business Results
sponsored by IBM
WHITE PAPER: This white paper explores how IBM introduced a next-generation graphical user interface to provide advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup user interfaces, and dramatically simplify backup administration.
Posted: 10 Apr 2014 | Published: 30 Jun 2013

IBM

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER: This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010

Imprivata

Proven, Trusted and HIPAA-Compliant Media Management
sponsored by Iron Mountain
WHITE PAPER: This resource features a media management partner that offers security and compliance tools for your tape backup and archive to ensure you consistently are up to par with the latest HIPAA updates.
Posted: 10 Apr 2014 | Published: 23 Oct 2013

Iron Mountain

The CIO’s Guide to HIPAA Compliant Text Messaging
sponsored by Imprivata
WHITE PAPER: This resource is a guide to ensuring secure texting policies while maintaining compliance with HIPAA and HITECH, and includes best practices and a vendor comparison checklist to use during product evaluation.
Posted: 10 Apr 2014 | Published: 31 Dec 2013

Imprivata

The CISO's Guide to a Full Night's Sleep
sponsored by EMC Corporation
WHITE PAPER: This resource shows the damages that can be caused by data breaches and audits and highlights an identity and access management solution that mitigates risk and ensures compliance.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

EMC Corporation

Expert Advice – 20 Practical Tips on Authentication from Healthcare IT Professionals
sponsored by Imprivata
WHITE PAPER: This resource reveals 20 single sign-on (SSO) and strong authentication implementation tips from your successful peers.
Posted: 10 Apr 2014 | Published: 31 Dec 2013

Imprivata

Automating the SANS 20 Critical Security Controls
sponsored by Qualys
WHITE PAPER: This guide explores security automation and how you can ensure system security with 4 main strategies.
Posted: 10 Apr 2014 | Published: 31 Mar 2013

Qualys

The Key to Seamless SSO
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource features a virtualized federated identity service that extends authentication beyond the security layer and reaches external applications, ensuring enterprise-wide protection.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Radiant Logic, Inc.

Solving SIEM Problems with Security Analytics
sponsored by EMC Corporation
WHITE PAPER: The status quo approach of collecting more logs from more sources won't help in detecting and responding to advanced threats. Logs are inherently limited in the level security visibility that they provide. Consider a new way of looking at SIEM.
Posted: 10 Apr 2014 | Published: 31 Jan 2013

EMC Corporation

What You Should Know About HIPPA and The Omnibus Final Rule
sponsored by Iron Mountain
WHITE PAPER: This resource explains the latest changes in HIPAA with the Omnibus Final Rule, and offers industry-leading advice on how to ensure compliance.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

Iron Mountain

Best Practices: Single Sign-On Drives Productivity, Security and Adoption When Used with EHR at The Johns Hopkins Hospital
sponsored by Imprivata
WHITE PAPER: In this case study, learn how Johns Hopkins Hospital was able to smoothly implement electronic health records (EHR) and computerized physician order entry (CPOE) without negatively impacting other processes or security. Click now for 5 essential guides for implementation success.
Posted: 09 Apr 2014 | Published: 31 Dec 2012

Imprivata

Evaluating Cost Of A DDoS Attack
sponsored by Dyn
WHITE PAPER: This brief whitepaper evaluates the costs of DDoS attacks and explores what current organizations are doing to prevent them.
Posted: 09 Apr 2014 | Published: 09 Apr 2014

Dyn

Prevent Data Leakage and Keep Business Users Happy
sponsored by BlackBerry
WHITE PAPER: Consult the following informative white paper to explore how device containerization solutions can improve productivity and reduce security risks without compromising user experience. Learn how to correctly select containerization solutions that best meet your unique requirements and much more.
Posted: 09 Apr 2014 | Published: 09 Apr 2014

BlackBerry

Making a Business Case for Fraud Prevention Technology
sponsored by IBM
WHITE PAPER: This guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

IBM

The Total Economic Impact of IBM Managed Mobility for BYOD - Windows
sponsored by IBM
WHITE PAPER: Check out this study from Forrester to get an evaluation of the economic impact and potential ROI you could realize by engaging in mobile enterprise services with IBM. If you're thinking about partnering with a managed mobility vendor for BYOD, this research could prove to be vital.
Posted: 08 Apr 2014 | Published: 31 May 2013

IBM

The Next Generation in Application Monitoring
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this resource to discover the 3 major components to application security that will best keep your assets protected across the network.
Posted: 08 Apr 2014 | Published: 31 May 2012

Hewlett-Packard Limited

RSA Web Threat Detection - Innovative and Effective Online Threat Detection
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper features a Web threat detection solution that uses business intelligence to better pinpoint and predict the anomalies, improving investigation and analysis of malicious behavior.
Posted: 08 Apr 2014 | Published: 31 Jan 2014

RSA, The Security Division of EMC

The Flexible Workplace: Unlocking Value in the BYOD Era
sponsored by IBM
WHITE PAPER: Access this exclusive white paper to discover how your organization can benefit from BYOD implementation, without sacrificing security or service levels.
Posted: 08 Apr 2014 | Published: 30 Nov 2012

IBM

No Silver Bullet: Eight Ways Malware Defeats Strong Security Controls
sponsored by IBM
WHITE PAPER: This whitepaper explores 8 ways malware can defeat your security strategy and outlines some key strategies for preventing these intrusions.
Posted: 08 Apr 2014 | Published: 31 Dec 2013

IBM

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos, Inc.
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 08 Apr 2014 | Published: 08 Apr 2014

Sophos, Inc.

What Will Security for the Network of the Future Look Like?
sponsored by Cisco Systems, Inc.
WHITE PAPER: This whitepaper takes a look at the future of data center infrastructure that addresses security concerns in an increasingly mobile world.
Posted: 07 Apr 2014 | Published: 24 Feb 2014

Cisco Systems, Inc.

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper offers unique insight and analysis into how network security professionals can better identify, manage, and contain the leading network security risk factors that arise from a mobile, always-on workforce.
Posted: 07 Apr 2014 | Published: 31 Jan 2014

Hewlett-Packard Limited

8 Questions to Ask Your Intrusion Security System Vendor
sponsored by Hewlett-Packard Limited
WHITE PAPER: This resource outlines 8 questions to ask your intrusion security provider – to ensure your network stays protected.
Posted: 07 Apr 2014 | Published: 30 Sep 2012

Hewlett-Packard Limited

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: This white paper features a security intelligence platform that integrates with data monitoring and vulnerability assessment for improved threat detection.
Posted: 07 Apr 2014 | Published: 30 Apr 2013

IBM
76 - 100 of 1353 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement