IT Management  >   Systems Operations  >  

Computer Security

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 
Definition continues below.
Computer Security White Papers (View All Report Types)
 
8 Elements Of Complete Vulnerability Management
sponsored by SilverSky
WHITE PAPER: Read this white paper to discover the eight elements of comprehensive vulnerability management, and to learn how you can make sure your vulnerabilities stay sealed against even the most sophisticated attacks.
Posted: 28 May 2015 | Published: 28 May 2015

SilverSky

Cloud the Way You Want it with Cisco Intercloud Fabric for Business
sponsored by Cisco
WHITE PAPER: This white paper highlights a cloud strategy that connects private, public and hybrid clouds into a globally connected network of clouds.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

PBBAs Tap into Key Data Protection Trends to Drive Strong Market Growth
sponsored by Symantec Corporation
WHITE PAPER: View this white paper to get a good look at the PBBA market, the drivers of market development, and the key benefits these appliances offer enterprises.
Posted: 17 Jun 2015 | Published: 01 Oct 2014

Symantec Corporation

An Introduction to AWS Security
sponsored by Global Knowledge
WHITE PAPER: This white paper explains the most important aspects of AWS security and what that means to the enterprise.
Posted: 17 Jun 2015 | Published: 05 May 2015

Global Knowledge

Unified Mobile Device, App and Data Security
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to learn how you can implement a solution that unifies mobile app and network security technologies, eliminating headaches for IT departments.
Posted: 04 Jun 2015 | Published: 02 Oct 2014

Pulse Secure

How Cloud Changes the Role of IT
sponsored by Cisco
WHITE PAPER: This white paper explains how the cloud is rapidly changing the role of IT. Read on to learn how one company's cloud strategy provides the foundation that organizations need to build hybrid-ready private clouds, and enables them to support any workload and any virtual machine on any cloud.
Posted: 01 Jun 2015 | Published: 31 Jan 2015

Cisco

15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014

IBM

Cloud the Way You Want it with Cisco Intercloud Fabric for Business
sponsored by Cisco
WHITE PAPER: This white paper highlights a cloud strategy that connects private, public and hybrid clouds into a globally connected network of clouds.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Cisco

Wireless Infrastructure Implementation: Best Practices
sponsored by Intel
WHITE PAPER: Access this white paper to discover best practices and best-known methods for architecting a wireless infrastructure within your organization. Follow these practices to help you quickly and efficiently replace wired LAN access services in your workspace with WLAN to provide employees with secure, reliable connections to mobile devices.
Posted: 19 Jun 2015 | Published: 28 Nov 2014

Intel

Ignore Compliance, Focus on Security
sponsored by FireHost Inc.
WHITE PAPER: This white paper explores how enterprises that focus on security first to address an organization's sensitive data will solve compliance requirements along the way. Instead of following a compliance checklist, learn to tackle the 5 risk assessment methodologies to mitigate threats and ensure confidentiality.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

FireHost Inc.
 
 
COMPUTER SECURITY DEFINITION (continued): …  will be compromised by physical theft or an attack by an external hacker . Hardware protection is inherently less vulnerable to software-based attacks and authentication processes are conducted through a secure subsystem. The device also enhances the security of Web browser s, email programs and other important applications.TPM chips are available from a number of vendors, including Atmel, Broadcom, Infineon, Sinosun, STMicroelectronics and Winbond. TPM could, potentially, be used on any type of computing device. The devices are currently being installed on desktops, laptops and tablet PCs by … 
Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement