IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
76 - 100 of 1598 Matches Previous Page  |  Next Page
Guide to Delivering Rich Graphics on Virtual Desktops
sponsored by Dell, Inc.
WHITE PAPER: Inside this expert white paper, discover 3 architectural models for delivering rich graphics to virtual desktop environments. Find out how to deliver accelerated graphics for a variety of users and workloads, and the benefits of using VDI for rich graphics.
Posted: 17 Mar 2016 | Published: 17 Mar 2015

Dell, Inc.

How to Choose an IT Platform to Empower Your Internet of Things
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This resource describes how to adapt your organization's human resources, processes, and architectures to derive maximum value from the Internet of Things (IoT). Discover the criteria you need to consider when establishing an IoT platform, including connectivity between devices and data, security and governance, big data analytics, and 2 more.
Posted: 16 Mar 2016 | Published: 31 Dec 2015

Hewlett-Packard Enterprise

Manufacturing: 2015 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This white paper offers a high-level overview of major threats trending across businesses worldwide over the past year. View now for insight into the current threat landscape for the manufacturing industry and offers solutions that can help you better protect your organization.
Posted: 16 Mar 2016 | Published: 31 Dec 2015

IBM

Report: Modern Threat Intelligence
sponsored by IBM
WHITE PAPER: The complexities of doing business at scale, both strategic and technical, create barriers in preventing breaches. Uncover ways to focus on user education and systematic protocols for operating a strong risk assessment program, allowing you to overcome these barriers.
Posted: 15 Mar 2016 | Published: 29 Feb 2016

IBM

Covering the Security Aspect of Software Asset Management
sponsored by Snow Software
WHITE PAPER: Managing large amounts of business critical information requires a high level of security. Access this white paper and uncover critical features in software asset management that prevent unauthorized access and destructive attacks.
Posted: 14 Mar 2016 | Published: 09 Dec 2015

Snow Software

Attack Resiliency Challenges Industry Collaboration Ability
sponsored by OpenDNS
WHITE PAPER: Attackers are reaping millions in profit, and defenders are struggling to detect and combat cybersecurity threats. This infographic lays out the ways that next-generation attacks on the network are challenging today's security teams.
Posted: 14 Mar 2016 | Published: 31 Dec 2015

OpenDNS

Financial Services Industry: 2015 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This report offers a high-level overview of the major threats trending across businesses worldwide over the past year. Access now for insight into the current threat landscape for the financial services industry and offers solutions that can help you better protect your organization overall.
Posted: 14 Mar 2016 | Published: 31 Dec 2015

IBM

Gartner 2015 Magic Quadrant for Application Security Testing
sponsored by IBM
WHITE PAPER: This Gartner resource compares 19 leading application security testing solution vendors, revealing the strengths and weaknesses of each one. View now and discover how the vendors performed in areas like product quality, sales execution and pricing, and customer experience.
Posted: 11 Mar 2016 | Published: 06 Aug 2015

IBM

Security Intelligence: Efficiently Analyze Big Data Sources
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Access this resource to learn about a strategy for security intelligence that can empower you to correlate data across dozens of platforms, detect and deflect attacks, perform queries faster, and much more.
Posted: 10 Mar 2016 | Published: 31 Dec 2015

Hewlett-Packard Enterprise

How to Handle a Ransomware Hijacking
sponsored by ESET
WHITE PAPER: This white paper reinforces the important precautions of secure mobile management in the enterprise. Uncover the global state of ransomware attacks, preventative measures you can take, and what to do if your organization gets infected.
Posted: 09 Mar 2016 | Published: 09 Mar 2016

ESET

Next Generation Endpoint Protection Buyer's Guide
sponsored by Sentinel Labs, Inc.
WHITE PAPER: This white paper teaches you about next-generation endpoint protection that can detect and prevent threats on endpoints using a unique behavior-based approach.
Posted: 08 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

Report: (In)Security Everywhere in 2016
sponsored by ESET
WHITE PAPER: In this report, you'll uncover ways to plow through 2016 with a proactive attitude of security awareness. Read on to learn about the current state of security (or lack thereof), and what you can do to rise above emerging threats such as ransomware, targeted attacks, crimeware, haxposure, and more.
Posted: 08 Mar 2016 | Published: 08 Mar 2016

ESET

Tips from a Security Researcher: Choose the Right Anti-Virus Solution for your Business
sponsored by ESET
WHITE PAPER: In this tech brief, one analyst urges you to look at several different antivirus solutions and come up with a short list of three vendors. Access now for details on three steps to take when searching for an anti-virus solution that fits your needs.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

ESET

Cyberthreat Intelligence: How Organizations are Using Analytics on Data Left Behind by Hackers
sponsored by LogRhythm, Inc.
WHITE PAPER: One barrier to understanding the merits of cyberthreat intelligence (CTI) is confusion about what it is and what it isn't. Access this article to gain an insider's perspective on what CTI really has to offer, who needs it, and how to find the right vendor.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

LogRhythm, Inc.

Windows Security Management: What's New in Windows 10
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper, you'll explore how new auditing and logging capabilities in Windows 10 give IT visibility into potential threats. Uncover ways to thwart threat actors by scoping user privileges, logging on with additional credentials, and more.
Posted: 07 Mar 2016 | Published: 29 Jan 2016

LogRhythm, Inc.

How to Mobilize your Corporate Content and Apps
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will examine a comprehensive mobile security strategy that will give your employees unparalleled access to resources behind your firewall, while also securing your data. Read on to see how this strategy includes the ability to mobilize SharePoint, Windows File Share, and your intranet sites, and more.
Posted: 07 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

2016 Cyber-Threat Defense Report
sponsored by LogRhythm, Inc.
WHITE PAPER: This report illuminates ways to reduce your attack surface using next-generation firewalls and CASBs, so you can control access to network and cloud-based computing resources. Access now to examine other tools and tactics, including network access control, full-network scans, and more.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogRhythm, Inc.

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will discover several mobile application lifecycle management (MALM) best practices for organizations with BYOD policies. Read on to discover the benefits of MALM, including single sign-on for all enterprise apps, real-time security reporting, and more.
Posted: 04 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

Make Endpoint Security Part of Your Client Systems Refresh
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this guide to uncover preloaded, validated and tested endpoint security strategies. Learn ways to extend data protection to employees on all endpoint devices, regardless of where they are located.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

Dell, Inc. and Intel®

Mobile Data Security: Finding the Balance for Secure Productivity
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will discover the strategic steps your organization should take before committing to a mobile security solution. Read on to uncover the questions you should be asking, both to vendors and to yourself, and how to use your knowledge to commit to a security solution—like container and virtualization approaches.
Posted: 04 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

IBM Report: Securing the C-suite
sponsored by IBM
WHITE PAPER: This white paper helps you understand the risks and vulnerabilities your network probably has and how to stop them from being exploited.
Posted: 03 Mar 2016 | Published: 29 Feb 2016

IBM

Mobile Device Management Policies: Best Practices Guide
sponsored by IBM MaaS360
WHITE PAPER: Your company's data is priceless, so protecting it should be your number one priority, without jeopardizing employee productivity. In this white paper, you will discover 10 best practices for MDM, including guidance on how to distribute settings Over the Air (OTA), enforce encryption, and more.
Posted: 03 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

8 Reasons Streamlining Network Security Should be your Top Priority
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this brief resource to find testimonials from network analysts, IT directors, and security offers on strategies they used to efficiently gain greater visibility into network security.
Posted: 03 Mar 2016 | Published: 03 Mar 2016

LogRhythm, Inc.

An Integrated Approach to Reducing Detection and Response Times
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this white paper to learn about an integrated set of tools that provide a holistic view across the ever-expanding attack surface, and apply big data analytics to detect patterns of concerning behavior faster.
Posted: 03 Mar 2016 | Published: 03 Mar 2016

LogRhythm, Inc.

The price of loyalty programs
sponsored by IBM
WHITE PAPER: This white paper shows you how to implement a loyal program for your customers and minimize the chance of account breaches. Learn how to diligently monitor your network and how to detect signs of attacks.
Posted: 14 Mar 2016 | Published: 30 Nov 2015

IBM
76 - 100 of 1598 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement