IT Management  >   Systems Operations  >  

Computer Security

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 
Definition continues below.
Computer SecurityMultimedia (View All Report Types)
 
Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

Ensure the Safety & Security of Apps, Documents E-Mails and More
sponsored by IBM
VIDEO: Uncover the ins-and-outs of a leading secure productivity suite that promises to protect your employee's e-mails, documents, apps and the web for work.
Posted: 05 Sep 2014 | Premiered: 05 Sep 2014

IBM

The One-Man SOC Webcast: Habits of Highly Effective Security Practitioners
sponsored by AlienVault
WEBCAST: This informative resource outlines top strategies for a highly effective SOC.
Posted: 12 Jun 2014 | Premiered: Jun 12, 2014

AlienVault

On-Demand Webinar: Privacy, Data Residency and Compliance in the Cloud Era
sponsored by CipherCloud
WEBCAST: This webcast reveals what it takes to stay compliant and protected in the age of the cloud.
Posted: 22 Sep 2014 | Premiered: Mar 10, 2014

CipherCloud

What Does the Future Hold for Managed File Transfer?
sponsored by IBM
WEBCAST: This webcast investigates the future of managed file transfer due to the evolving digital universe.
Posted: 15 Aug 2014 | Premiered: Aug 15, 2014

IBM

MobileIron Resource Booth
sponsored by SearchSecurity.com
VIRTUAL TRADESHOW: Almost every enterprise is now building out a mobile apps program. Many first generation mobile apps were not well designed, readily adopted by users, or built for supportability. This booth contains MobileIron assets that will cover lessons learned over the last two years of mobile app development as well as information on their MAM solutions.
Posted: 22 Sep 2014 | Premiered: Sep 22, 2014

TOPICS:  Security
SearchSecurity.com

PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
sponsored by AlienVault
WEBCAST: This practical session covers strategies to help you take the pain out of PCI DSS reporting.
Posted: 24 Jul 2014 | Premiered: Jul 24, 2014

AlienVault

ABAC to the Future: Deliver Smarter SiteMinder Policies with No Sweat
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast features a next-generation authorization strategy offering a fine-grained approach to user provisioning. Click now to explore key benefits.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Radiant Logic, Inc.

Big Ideas, Big Tech: Tackling Oracle Backup in the Face of Massive Data Growth
sponsored by EMC Corporation
WEBCAST: As the criticality and quantity of data continues to grow, the gap between DBA and the Backup Administrator increase further. DBAs want to rely on their own backup rather than waiting for an administrator, while administrators complete tasks in the most efficient way possible.
Posted: 15 Sep 2014 | Premiered: Sep 15, 2014

EMC Corporation

EMC Video Surveillance Storage Solution
sponsored by EMC & Arrow
WEBCAST: Watch this concise webcast to uncover the key features of an industry-leading storage solution which has been specifically designed to support your video surveillance systems.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

EMC & Arrow
 
 
COMPUTER SECURITY DEFINITION (continued): …  will be compromised by physical theft or an attack by an external hacker . Hardware protection is inherently less vulnerable to software-based attacks and authentication processes are conducted through a secure subsystem. The device also enhances the security of Web browser s, email programs and other important applications.TPM chips are available from a number of vendors, including Atmel, Broadcom, Infineon, Sinosun, STMicroelectronics and Winbond. TPM could, potentially, be used on any type of computing device. The devices are currently being installed on desktops, laptops and tablet PCs by … 
Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement