IT Management  >   Systems Operations  >  

Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 
Definition continues below.
Security White Papers (View All Report Types)
76 - 100 of 1670 Matches Previous Page  |  Next Page
An Inside View of a Zero-Day Campaign
sponsored by Malwarebytes Corporation
WHITE PAPER: This article gets you inside the workings of a zero-day attack by giving you a step-by-step look at one that occurred just a few months ago.
Posted: 05 May 2015 | Published: 21 Apr 2015


Survey Results: Endpoint Security in a Time of Uncertainty
sponsored by Malwarebytes Corporation
WHITE PAPER: In this survey report, find statistics on the most common endpoint security threats faced, what protections are being leveraged, and more.
Posted: 05 May 2015 | Published: 05 May 2015


Endpoint Security Must Get Better
sponsored by Trend Micro
WHITE PAPER: Access this white paper now to learn how unsatisfied IT leaders are simplifying endpoint security while improving protection against attacks and avoiding the costs of potential security incidents.
Posted: 05 May 2015 | Published: 05 May 2015

Trend Micro

Mobile App Security Through Containerization: Top 10 Considerations
sponsored by Good Technology
WHITE PAPER: In this white paper, you'll learn the 10 best reasons to adopt containerization as your new mobile app security strategy.
Posted: 04 May 2015 | Published: 25 Jul 2014

Good Technology

Mobile App Management: 10 Requirements From Real Customer Deployments
sponsored by Good Technology
WHITE PAPER: Access this white paper for the 10 essential factors of a strategic, long-term, transformational MAM program.
Posted: 04 May 2015 | Published: 25 Jul 2014

Good Technology

Big Data Analytics On Security Data
sponsored by Platfora
WHITE PAPER: Access this exclusive white paper to learn how big data analytics are playing a new role in security. Discover why data driven analytic tools are helping executives understand and prevent advanced cyber-attacks securing their organization's reputation and money.
Posted: 04 May 2015 | Published: 04 May 2015

Platfora

The Printer Playbook: Strategy and Insight for the Enterprise
sponsored by Hewlett-Packard Company
WHITE PAPER: This Printer Playbook explains why printer security should be part of your overall information technology strategy. It offers suggestions and resources to help businesses begin securing their networks.
Posted: 04 May 2015 | Published: 04 May 2015

Hewlett-Packard Company

The Importance of Embedded Device Security
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this Red Tiger Security Paper, Printer and Embedded Device Security, and see where and how bad guys exploit print devices—and the measures you can take to stop them.
Posted: 04 May 2015 | Published: 07 Apr 2015

Hewlett-Packard Company

Cybersecurity Trends of 2015: A View from the Front Lines
sponsored by FireEye
WHITE PAPER: In today's dangerous threat landscape, the only way to stay secure is to know what you're up against. In this cybersecurity report, find essential information on today's latest security trends.
Posted: 04 May 2015 | Published: 31 Dec 2014

FireEye

Enabling The Secure And Rapid Adoption Of Cloud Services
sponsored by Microsoft
WHITE PAPER: Access the results of this Forrester report to discover what's driving the current trend towards adoption of cloud technology and why the benefits of cloud outweigh the potential security risks for many organizations. Read on to discover what your organization can do you address potential security risks in your cloud system.
Posted: 01 May 2015 | Published: 31 Oct 2013

Microsoft

uilding Layered Security to Defend Against Cyber Attacks
sponsored by Absolute Software
WHITE PAPER: In this white paper, discover how you can implement layered security for protection that is significantly stronger than what the average enterprise achieves.
Posted: 01 May 2015 | Published: 30 Nov 2014

Absolute Software

Viruses in the Queue: IT Pros Share Their Experiences Combating Printer Security Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, hear firsthand experience from three different IT pros who found out the hard way about document and network security—it only takes one unprotected printer to create major, long-lasting headaches.
Posted: 01 May 2015 | Published: 01 May 2015

Hewlett-Packard Company

How SMBs Can Advance their Security Practices
sponsored by Hewlett-Packard Company
WHITE PAPER: In this analyst Q&A, Raymond Boggs, Vice President, Small/Medium Business Research, IDC, shares his insights and advice on behalf of firms looking to refine their security practices for maximum effectiveness.
Posted: 01 May 2015 | Published: 31 Mar 2015

Hewlett-Packard Company

Running the Risk: Why a Generation of Sharing Could Be Good for Business
sponsored by Aruba Networks
WHITE PAPER: This insightful research report discusses how businesses can develop a mobile-aware culture that nurtures innovation, collaboration, and productivity, while minimizing the risk of data loss.
Posted: 01 May 2015 | Published: 01 May 2015

Aruba Networks

5 Traps to Avoid in your 2015 Mobile App Program
sponsored by Good Technology
WHITE PAPER: Access this white paper now to learn the 5 traps you absolutely must avoid if you want a successful mobile app program.
Posted: 01 May 2015 | Published: 30 Jan 2015

Good Technology

Anti-Exploit Tools: The Next Wave of Enterprise Security
sponsored by Malwarebytes Corporation
WHITE PAPER: In this white paper, discover the shortcomings of traditional preventative security approaches and what you can do to move beyond them.
Posted: 01 May 2015 | Published: 01 May 2015


Protecting Healthcare Data in a Mobile World
sponsored by Absolute Software
WHITE PAPER: In this white paper, find essential information you need to build a comprehensive security system for today's healthcare climate.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Absolute Software

Track and Analyze the Impact of Mobile Apps, Platforms and Device Preferences
sponsored by Good Technology
WHITE PAPER: Access this white paper now to discover all of the latest mobile trends and learn why security is quickly becoming the greatest concern for decision makers.
Posted: 30 Apr 2015 | Published: 27 Feb 2015

Good Technology

Taking Strategic Action for Mobile Endpoint Management
sponsored by Absolute Software
WHITE PAPER: In this white paper, find five steps to creating a proactive, comprehensive endpoint management strategy.
Posted: 30 Apr 2015 | Published: 25 Apr 2014

Absolute Software

Critical Capabilities for Client Management Tools
sponsored by Absolute Software
WHITE PAPER: This white paper lists the eight critical capabilities of good end user management tools. In addition, it presents reviews and ratings of fourteen different end user management platforms.
Posted: 30 Apr 2015 | Published: 13 Jun 2014

Absolute Software

Safe and Sound: The Importance of PC Security and Manageability
sponsored by Dell, Inc. & Intel®
WHITE PAPER: This white paper discusses the biggest PC security and manageability pain points for IT pros.
Posted: 30 Apr 2015 | Published: 30 Nov 2013

Dell, Inc. & Intel®

Does Android Dream of Enterprise Adoption?
sponsored by IBM
WHITE PAPER: This white paper explains how you can protect yourself from common Android security holes with the proper MDM platform so that you can take advantage of the employee productivity benefits. If you're nervous about user management, data consumption, rooting and other issues, then this is the resource for you.
Posted: 29 Apr 2015 | Published: 26 Dec 2014

IBM

Securing the Mobile Enterprise Environment
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore best practices for addressing security issues for the mobile enterprise environment, including those for establishing secure mobile access and mobile device security. Discover solutions designed to help your organization maintain tight network and mobile device security while still enhancing employee productivity.
Posted: 29 Apr 2015 | Published: 30 Sep 2014

Dell, Inc. and Intel®

Getting the most out of your cloud deployment
sponsored by BitDefender
WHITE PAPER: In this white paper, discover tips for efficiently transitioning to the cloud and ensuring cloud application security.
Posted: 28 Apr 2015 | Published: 31 Dec 2014

BitDefender

Why a Secure Enterprise Workspace is the Best Approach for Mobile Productivity
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Inside this white paper, explore how a secure enterprise workspace can help to improve mobile productivity while meeting your organizations requirements for security, manageability, and configurability.
Posted: 28 Apr 2015 | Published: 27 Feb 2015

Dell, Inc. and Intel®
76 - 100 of 1670 Matches Previous Page    2 3 4 5 6 7    Next Page
 
SECURITY DEFINITION (continued): …  specifications for the protection of computer resources from threats posed by malicious entities without infringing on the rights of end users.Microsoft defines trusted computing by breaking it down into four technologies, all of which require the use of new or improved hardware at the personal computer (PC) level: Memory curtaining -- prevents programs from inappropriately reading from or writing to each other's memory. Secure input/output (I/O) -- addresses threats from spyware such as keyloggers and programs that capture the contents of a display. Sealed storage -- allows computers to securely … 
Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement