IT Management  >   Systems Operations  >  

Computer Security

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 
Definition continues below.
Computer Security Reports
 
17 Security Products Tested for Malware Removal and Repair
sponsored by Malwarebytes Corporation
WHITE PAPER: This white paper presents the results of a series of independent tests on seventeen different anti-malware products.
Posted: 05 May 2015 | Published: 05 May 2015


Vulnerability Management for the Mid-Size: How to Run a World Class Program Even if You're Not IBM
sponsored by Risk IO
WHITE PAPER: In this white paper, discover how you can design a high-quality vulnerability management program on a midsized budget and with a small security team.
Posted: 20 May 2015 | Published: 20 May 2015

Risk IO

Hosted Exchange 2013 Buyer’s Guide
sponsored by Rackspace
RESOURCE: Access this email hosting buyer's guide for a thorough 4-step explanation to finding a better Exchange.
Posted: 14 May 2015 | Published: 01 Dec 2014

Rackspace

Consolidate digital identities, devices, SaaS, apps and workflows with the cloud
sponsored by Matrix42
WHITE PAPER: This informative white paper reveals a solution that can help you enterprise perform at the top of its game through consolidation.
Posted: 15 May 2015 | Published: 15 May 2015

Matrix42

How to Secure the Enterprise With Threat Intelligence and Protection Software
sponsored by AVG Technologies
EGUIDE: This expert guide can help you stay secure in today's threat landscape by helping you build a strong, layered security system that includes threat intelligence and multiple forms of endpoint protection.
Posted: 19 May 2015 | Published: 19 May 2015

AVG Technologies

Develop a Plan for Desktop DR
sponsored by VMware
WHITE PAPER: Access this infographic to discover several staggering results of a disaster on organizations that can seriously affect the workforce.
Posted: 22 May 2015 | Published: 22 May 2015

VMware

Endpoint Security Benefits from Web-Based Platforms
sponsored by Absolute Software
WEBCAST: This brief webcasts highlights which features to look for in endpoint security technology. Tune in, and assess whether or not your current strategy has the following capabilities.
Posted: 07 May 2015 | Premiered: May 7, 2015

Absolute Software

Distil Networks 2015 Bad Bot Report: 5 High-Risk Lessons
sponsored by Distil Networks
WEBCAST: Distil Networks has produced IT Security's most in-depth analysis on the sources, types and sophistication levels of last year's bot attacks. Listen to this exclusive webcast to keep your organization safe.
Posted: 11 May 2015 | Premiered: May 15, 2015

Distil Networks

Avoid Risks by Keeping Secure FTP Policies Straightforward
sponsored by IBM
EGUIDE: In this e-guide, discover why most users fail to securely transfer files and what you can do to stop their risky behavior.
Posted: 21 May 2015 | Published: 21 May 2015

IBM

Anatomy of Cyber Attack
sponsored by Hewlett-Packard Company
WEBCAST: Attend this webinar to learn the anatomy of an advanced persistent threat and why it's critical to detect and isolate the attack at "patient zero," the initial point of infection.
Posted: 06 May 2015 | Premiered: Mar 31, 2015

Hewlett-Packard Company
 
 
COMPUTER SECURITY DEFINITION (continued): …  will be compromised by physical theft or an attack by an external hacker . Hardware protection is inherently less vulnerable to software-based attacks and authentication processes are conducted through a secure subsystem. The device also enhances the security of Web browser s, email programs and other important applications.TPM chips are available from a number of vendors, including Atmel, Broadcom, Infineon, Sinosun, STMicroelectronics and Winbond. TPM could, potentially, be used on any type of computing device. The devices are currently being installed on desktops, laptops and tablet PCs by … 
Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement