IT Management  >   Systems Operations  >  

Computer Security

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 
Definition continues below.
Computer SecurityWhite Papers (View All Report Types)
 
Protecting Your Business with a More Mature IT Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: HP Security Intelligence and Operations Consulting has performed maturity assessments evaluating people, processes and technology in 69 SOCs. This report presents their findings on the measured maturity level of SOCs by industry.
Posted: 20 Nov 2014 | Published: 20 Nov 2014

Hewlett-Packard Company

Imaging and Printing: Is Your Valuable Data Protected?
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces a set of HP solutions that can help you assess, manage, and strengthen security within your organization.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Hewlett-Packard Limited

Cisco 2014 Midyear Security Report - Executive Summary
sponsored by Cisco
WHITE PAPER: Download this exclusive whitepaper now for an overview of the security landscape midway through 2014, including threat intelligence, rising trends, and much more.
Posted: 14 Nov 2014 | Published: 14 Nov 2014

Cisco

European Regulations That Impact Cloud Usage
sponsored by SkyHigh
WHITE PAPER: This exclusive whitepaper serves as a cheat sheet for 11 crucial privacy and cross-border residency regulations in Europe.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

SkyHigh

Trends in Data Centric Security
sponsored by Intel® Services
WHITE PAPER: This white paper discusses Data Centric Security, which protects data when it is shared across multiple platforms, systems, or data centers by focusing security controls onto the data itself, rather than relying on the underlying infrastructure to keep it out of the wrong hands.
Posted: 05 Nov 2014 | Published: 14 Sep 2014

Intel® Services

How to Protect Critical Data while Maintaining Ease of Use
sponsored by Gemalto
WHITE PAPER: This exclusive whitepaper explores how you can strike a balance between security and convenience.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

How Telcos Can Outpace Commoditization in the Application Economy
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how telecommunications service providers are uniquely positioned to leverage their infrastructure, expertise, and insights to provide identity management services for the application economy.
Posted: 13 Nov 2014 | Published: 29 Aug 2014

CA Technologies.

How to Enable Secure Mobility & Improve Efficiency
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at how mobility is changing the way organizations do business. Read on to learn more.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

Citrix

Cutting the Cost of Application Security
sponsored by Imperva
WHITE PAPER: This white paper describes the financial implications of web attacks, DDoS attacks, and other web-based threats, and also introduces one company's web application firewall as a potential solution.
Posted: 30 Oct 2014 | Published: 30 Oct 2014

Imperva

Are You Ready for Windows Server 2012 Migration?
sponsored by Dell Software
WHITE PAPER: Read this white paper to learn about the improved virtualization, storage, networking, and other features of Windows Server 2012. Time is running out for Windows Server 2003 support and now is the right time to begin your migration to Windows Server 2012.
Posted: 04 Nov 2014 | Published: 11 Dec 2013

Dell Software
 
 
COMPUTER SECURITY DEFINITION (continued): …  will be compromised by physical theft or an attack by an external hacker . Hardware protection is inherently less vulnerable to software-based attacks and authentication processes are conducted through a secure subsystem. The device also enhances the security of Web browser s, email programs and other important applications.TPM chips are available from a number of vendors, including Atmel, Broadcom, Infineon, Sinosun, STMicroelectronics and Winbond. TPM could, potentially, be used on any type of computing device. The devices are currently being installed on desktops, laptops and tablet PCs by … 
Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement