IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
SecurityWhite Papers (View All Report Types)
76 - 100 of 1508 Matches Previous Page  | Next Page
Compliance - Protecting Payment Information with PCI DSS
sponsored by GlobalScape
WHITE PAPER: This informative whitepaper outlines strategies for protecting your customer data, remaining compliant and explains why complying with regulations won't ensure security.
Posted: 07 Jul 2014 | Published: 31 Dec 2013

GlobalScape

Symantec Intelligence Report: Internet Security Threats - May 2014
sponsored by Symantec Corporation
WHITE PAPER: Read this Symantec Intelligence Report for an in-depth analysis of the trends in internet security that we have seen in the past year, including data on targeted attacks and data breaches; malware tactics; social media and mobile threats; and more.
Posted: 07 Jul 2014 | Published: 31 May 2014

Symantec Corporation

Choosing the Right Virtual Server Backup Software for SMEs
sponsored by CA ARCserve
WHITE PAPER: Access this white paper to learn about a leading backup software solution that protects both physical and virtual environments.
Posted: 07 Jul 2014 | Published: 31 Mar 2014

CA ARCserve

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos, Inc.
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 06 Jul 2014 | Published: 02 Jul 2014

Sophos, Inc.

Network protection and UTM Buyers Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

3-Phase Clinical Content Archive Strategy
sponsored by Perceptive Software
WHITE PAPER: This white paper explains how the "Walk-Run-Fly" strategy can help healthcare organizations use VNA to effectively manage content.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

Perceptive Software

Protecting Digitalized Assets in Healthcare: Which Managed File Transfer Deployment Model is Right for You?
sponsored by GlobalScape
WHITE PAPER: Learn what types of policies and tools can be implemented to secure valuable healthcare data.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

GlobalScape

IT Executive Guide to Security Intelligence
sponsored by IBM
WHITE PAPER: This helpful guide discusses one company's approach to security intelligence, and how this innovation could entirely change the way that businesses approach threat management.
Posted: 03 Jul 2014 | Published: 31 Jan 2013

IBM

Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER: In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012

IBM

Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

IBM

BYOD Risks and Rewards How to keep employee smartphones, laptops and tablets secure
sponsored by Sophos, Inc.
WHITE PAPER: This informative resource takes a look at the risks and rewards of BYOD from a security perspective and details what your organization can do to embrace the brand while ensuring that your sensitive data is protected.
Posted: 03 Jul 2014 | Published: 25 Feb 2014

Sophos, Inc.

Mobile Device Management Buyers Guide
sponsored by Sophos, Inc.
WHITE PAPER: This informative paper takes an in-depth look at the mobile device management (MDM) solutions that are on the market today, comparing features and discussing the benefits and drawbacks of each tool.
Posted: 03 Jul 2014 | Published: 25 Feb 2014

Sophos, Inc.

Buyers Guide: Choosing an Endpoint Protection Solution for Your Enterprise
sponsored by Sophos, Inc.
WHITE PAPER: This buyers guide provides helpful charts to assist you in choosing the endpoint protection solution that will best fit the needs of your enterprise.
Posted: 03 Jul 2014 | Published: 01 Jul 2014

Sophos, Inc.

Managed file transfer: Minimizing risk and strengthening compliance in data exchange
sponsored by IBM
WHITE PAPER: In this resource, explore the right MFT solution for you—one that meets the highest standards of compliance, security, productivity, and profitability.
Posted: 02 Jul 2014 | Published: 01 Oct 2013

IBM

Application Security 101
sponsored by Veracode, Inc.
WHITE PAPER: View this white paper for a guide to modern application security with a focus on why software development teams should be trained in secure development techniques.
Posted: 02 Jul 2014 | Published: 02 Jul 2014

Veracode, Inc.

Unified Threat Management Guide
sponsored by Sophos, Inc.
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 02 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls
sponsored by Sophos, Inc.
WHITE PAPER: Unified Threat Management (UTM) is a common tool for most security professionals because of its ability to integrate multiple security technologies onto one platform. This brief guide explores the various questions you should ask when deciding your UTM systems.
Posted: 02 Jul 2014 | Published: 30 Nov 2013

Sophos, Inc.

Meeting Business Data Protection Needs
sponsored by CA ARCserve
WHITE PAPER: This white paper dives into the details about virtualization and unveils some hidden complexities when it comes to backup and recovery requirements.
Posted: 02 Jul 2014 | Published: 31 Dec 2013

CA ARCserve

Facilitating Enterprise Compliance With Globalscape® EFT™ and the High-Security Module
sponsored by GlobalScape
WHITE PAPER: In this white paper, discover how Enhanced File Transfer (EFT™) High Security module (HSM) combined with the Auditing and Reporting module (ARM) remains compliant to a variety of standards including PCI DSS.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

GlobalScape

Exposing the Cybersecurity Cracks: A Global Perspective
sponsored by Websense, Inc.
WHITE PAPER: This eye-opening reviews data collected from nearly 5000 experienced IT workers regarding deficiencies in the ways that their companies attempt to think about, fight, and detect security breaches.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Websense, Inc.

Enhance End-User Productivity While Keeping your Apps and Files Secure
sponsored by NComputing
WHITE PAPER: This exclusive whitepaper details a product that can help you increase end-use productivity while keeping your application and files secure in the increasingly mobile business landscape.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

NComputing

Managing Mobility: Balancing the Risks and Rewards
sponsored by Accellion, Inc.
WHITE PAPER: This research report will outline the importance of balancing the advantages and risk of increasing enterprise mobility.
Posted: 01 Jul 2014 | Published: 21 Feb 2014

Accellion, Inc.

Data Security Checklist: Tips for Managing the Mobile Enterprise
sponsored by Accellion, Inc.
WHITE PAPER: This document presents a checklist of data security features to consider when establishing an enterprise mobility management strategy.
Posted: 01 Jul 2014 | Published: 30 Nov 2013

Accellion, Inc.

Secure Your Mobile Content While Increasing Productivity
sponsored by Accellion, Inc.
WHITE PAPER: This report provides key survey findings indicating how important mobile access is to users, how likely they are to bypass authorized systems, how compliant current collaboration practices are, and what collaboration functionality user expect on their mobile devices.
Posted: 01 Jul 2014 | Published: 31 Dec 2013

Accellion, Inc.

Mitigate the Risks of File Sharing and BYOD with Private Clouds
sponsored by Accellion, Inc.
WHITE PAPER: This informative white paper examines private cloud solutions for file sharing and synchronization, discussing how a private cloud can help you realize the benefits that BYOD provides without having to expose your sensitive information to potential risks.
Posted: 01 Jul 2014 | Published: 28 Jun 2013

Accellion, Inc.
76 - 100 of 1508 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement