IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
76 - 100 of 1680 Matches Previous Page  |  Next Page
Cyber Security Roadmap
sponsored by ESET
WHITE PAPER: This white paper presents a clear, easy-to-follow roadmap to creating comprehensive security on a modest budget.
Posted: 06 Mar 2015 | Published: 06 Mar 2015

ESET

Hybrid Cloud Model Enhances DNS Security
sponsored by Efficientip
WHITE PAPER: This white paper suggests one way to prevent DNS compromises – a hybrid cloud DNS server.
Posted: 05 Mar 2015 | Published: 31 Dec 2014

Efficientip

Survey Reveals the Danger of DNS Attacks
sponsored by Efficientip
WHITE PAPER: This survey on DNS attacks reveals how powerful DNS attacks are and what securities are most effective against them.
Posted: 05 Mar 2015 | Published: 30 Jun 2014

Efficientip

Cyber Risk Report 2015 - Executive Summary
sponsored by Hewlett-Packard Company
WHITE PAPER: The HP Cyber Risk Report 2015 provides a broad overview of the threat landscape and how hackers operate.
Posted: 05 Mar 2015 | Published: 28 Feb 2015

Hewlett-Packard Company

2015 Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This 2015 cyber risk report provides a broad view of the 2014 threat landscape and gives you the information you need to protect your business.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

Hewlett-Packard Company

Holistic Fraud Prevention: Transforming the Customer's Experience
sponsored by IBM
WHITE PAPER: Use this white paper to implement creative, efficient and comprehensive fraud prevention.
Posted: 04 Mar 2015 | Published: 04 Mar 2015

IBM

Saint-Gobain group reduces expected branch server investment by 97% with Nomad
sponsored by 1e Inc
WHITE PAPER: Saint-Gobain Group, the world leader in the habitat and construction markets, needed to reduce their expected branch server investment. They turned to a streamlined systems management platform. Read this white paper to find out which systems management platform enables Saint-Gobain to make significant cost savings
Posted: 04 Mar 2015 | Published: 04 Mar 2015

1e Inc

The Financial Impact of Advanced Persistent Threats
sponsored by IBM
WHITE PAPER: This detailed report shows you just how detrimental APTs can be.
Posted: 03 Mar 2015 | Published: 01 May 2014

IBM

Uncover the Top Ten Database Threats That Could Affect Your Business
sponsored by Imperva
WHITE PAPER: This white paper highlights the top ten threats that affect traditional databases as well as Big Data technologies.
Posted: 03 Mar 2015 | Published: 31 Dec 2014

Imperva

Top 5 Aspects of Security to Look for in a Cloud Provider
sponsored by Oracle Corporation
WHITE PAPER: Get the 5 security areas you needs to be concerned with when selecting the cloud system that's right for your business.
Posted: 03 Mar 2015 | Published: 31 Dec 2013

Oracle Corporation

Introducing Amazon RDS for Aurora
sponsored by Global Knowledge
WHITE PAPER: Discover how the enhanced performance and reliability of Amazon Aurora will help AWS customers reduce performance bottlenecks in their applications. The relatively low cost of Aurora will tempt many customers to migrate workloads to this implementation of RDS.
Posted: 03 Mar 2015 | Published: 27 Feb 2015

Global Knowledge

Best Practices for Creating the Network-Enabled Cloud
sponsored by XO Communications
WHITE PAPER: Access this white paper to discover a step-by-step guide to help improve your network to handle services delivered from multiple clouds.
Posted: 02 Mar 2015 | Published: 31 Dec 2014

XO Communications

Tolly Test Report: Web Application and  Security Access Manager Appliance
sponsored by IBM
WHITE PAPER: Access this white paper that details a test report of a web security and access manger appliance. Read on to learn how this appliance scored, and find out about the benefits it can provide your company.
Posted: 02 Mar 2015 | Published: 30 Nov 2014

IBM

DDoS Response Playbook
sponsored by Imperva
WHITE PAPER: This white paper will help you create a response plan for one of the most widespread threats – DDoS attacks.
Posted: 02 Mar 2015 | Published: 02 Mar 2015

Imperva

The Four Key Elements of Fraud Prevention
sponsored by IBM
WHITE PAPER: This white paper helps you stop fraud by outlining the four key elements of holistic fraud prevention.
Posted: 02 Mar 2015 | Published: 31 Aug 2014

IBM

NetApp Multi-Cloud Private Storage- Take charge of Your Cloud Data
sponsored by NetApp
WHITE PAPER: Access this white paper to discover the emergence of new hybrid architectures that give IT organizations the same enterprise-class security, data protection, and performance they have built on-premises combined with the flexibility and cost efficiencies of the public cloud.
Posted: 02 Mar 2015 | Published: 30 Sep 2014

NetApp

The Latest Trends Surrounding Collaboration in the Workplace
sponsored by Premiere Conferencing
WHITE PAPER: Access this white paper that highlights trends and technologies that are powering business collaboration in 2015.
Posted: 02 Mar 2015 | Published: 02 Mar 2015


Traps Advanced Endpoint Protection: Technology Overview
sponsored by Palo Alto Networks
WHITE PAPER: This white paper describes a security approach that provides protection before the attacks can penetrate.
Posted: 02 Mar 2015 | Published: 30 Nov 2014

Palo Alto Networks

Instill Better Collaboration Practices Into Your Business
sponsored by XO Communications
WHITE PAPER: View this white paper to learn why deploying a hosted PBX service is more advantageous than sticking with your traditional, premier-based PBX.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

XO Communications

Security predictions for 2015
sponsored by Imperva
WHITE PAPER: With the insight of security experts and the help of analytics tools, this white paper presents five security predictions for the 2015 security landscape.
Posted: 27 Feb 2015 | Published: 31 Jan 2015

Imperva

How Desktop-as-a-Service Can Solve Higher Education’s End-User Computing Challenges
sponsored by VMware
WHITE PAPER: Access this informative white paper to discover how desktop-as-a-service builds on virtual desktop computing but takes it a step further moving it to the cloud. Explore eleven benefits of DaaS and how this technology is built for higher education.
Posted: 27 Feb 2015 | Published: 28 Nov 2014

VMware

The Cloud Pillars: Five Foundational Building Blocks for Apps in the Cloud
sponsored by Rackspace
WHITE PAPER: This white paper explains the five pillars associated with cloud applications.
Posted: 27 Feb 2015 | Published: 13 Nov 2014

Rackspace

Mitigating Risk with Security Intelligence and Identity Assurance
sponsored by IBM
WHITE PAPER: Access this white paper to learn about an integrative approach that lets companies quickly identify abnormalities in user behavior, as well as fighting insider threats all while complying with regulations.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

IBM

Threat Trend: Threat Landscape Review
sponsored by Palo Alto Networks
WHITE PAPER: This exlusive security report identifies threats from malware over a wide array of applications by executing them in a virtual environment and observing their behavior. Read on to learn what was discovered, and what the new cybercrime trends are moving forward.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Palo Alto Networks

Streamlining Security Identity Governance
sponsored by IBM
WHITE PAPER: Access this white paper to discover a business-centric approach to identity access and compliance that improves security and helps reduce costs for managing accounts, groups, credentials, and other access rights.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

IBM
76 - 100 of 1680 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement