IT Management  >   Systems Operations  >  

Computer Security

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 
Definition continues below.
Computer Security White Papers (View All Report Types)
 
Three Key Considerations in Securing the Software-Defined Data Center (SDDC)
sponsored by Intel Security
WHITE PAPER: The deployment of proven technologies to protect private or hybrid cloud environment and/or a software-defined data center (SDDC) is vital. Discover three critical steps that enterprises can adopt and adhere to ensure both data and the data center are protected from both internal/external threats.
Posted: 08 Jun 2016 | Published: 31 Mar 2015

Intel Security

BYOD Mobile Device Management
sponsored by IBM
WHITE PAPER: Discover a management solution that can streamline access, compliance, and protection for BYOD from a single screen. Learn how to provision, protect and manage your devices easily; configure email, calendar, contacts, Wi-Fi and VPN profiles to quickly onboard users; set security policies and enforce them with automated compliance actions; and more.
Posted: 16 Jun 2016 | Published: 31 Dec 2015

IBM

Embracing the Digital Workplace
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Organizations across all industries recognize the need to embrace digital transformation or risk being left behind in today's mobile world. Transform your business by embracing digital and discover the key trends driving the transformation as well as, the impact these trends are having on the underlying mobile networks.
Posted: 07 Jun 2016 | Published: 07 Jun 2016

Hewlett Packard Enterprise

Top 10 Cyber Incident Pain Points: Are You Prepared?
sponsored by Delta Risk
WHITE PAPER: Discover the 10 most prevalent factors that lead to a network being especially prone to cyber incidents. Interestingly, these characteristics are common across industries.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Delta Risk

2016 Security Buyer's Guide
sponsored by Illumio
WHITE PAPER: Access a step-by-step guide, complete with checklists, for adaptive security buyers in 2016. This guide will allow enterprises to pre assess their security posture, discover gaps, and evolve their strategy to better suit the hybrid-cloud environment.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Illumio

Why Businesses Are Adopting Network Virtualization
sponsored by VMware
WHITE PAPER: It only takes one objective to make the move to network virtualization worth your while. But what's it mean for IT organizations? Explore the advantages and benefits that make network virtualization attractive to IT organizations and identify how it might suit your business scenario.
Posted: 15 Jun 2016 | Published: 29 Feb 2016

VMware

Empower a Mobile Workforce with Secure App Delivery
sponsored by Citrix
WHITE PAPER: As mobility and the internet create the expectation of immediate access to information from anywhere, IT is challenged with the need to deliver secure application access across any device. Discover how to ensure application security in the mobile trend.
Posted: 10 Jun 2016 | Published: 27 Feb 2015

Citrix

Modern Adaptive Security
sponsored by Illumio
WHITE PAPER: Discover how the need for more segmentation, protecting high-value assets, and meeting stricter compliance rules will shift how security budgets are allocated in the near-future.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Illumio

Breaking Down the Benefits of Desktop Transformation
sponsored by VMware
WHITE PAPER: The future of mobility relies on the technology that it replaced; desktop computing. Desktop computing is undergoing a transformation that will couple it with the advances mobility has to offer. Read on to learn about the benefits this next-gen desktop is promising to deliver.
Posted: 20 May 2016 | Published: 29 Dec 2015

VMware

Consolidate your Secure Remote Access Delivery Infrastructure with One URL
sponsored by Citrix
WHITE PAPER: Many enterprises are experiencing fragmented secure remote access infrastructure primarily characterized by multiple URLs. This is creating inconsistent and poor access experiences for employees and users. Read on to discover a next-generation secure remote access solution that addresses these issues, particularly those dealing with mobility.
Posted: 14 Jun 2016 | Published: 29 May 2015

Citrix
 
 
COMPUTER SECURITY DEFINITION (continued): …  will be compromised by physical theft or an attack by an external hacker . Hardware protection is inherently less vulnerable to software-based attacks and authentication processes are conducted through a secure subsystem. The device also enhances the security of Web browser s, email programs and other important applications.TPM chips are available from a number of vendors, including Atmel, Broadcom, Infineon, Sinosun, STMicroelectronics and Winbond. TPM could, potentially, be used on any type of computing device. The devices are currently being installed on desktops, laptops and tablet PCs by … 
Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement