IT Management  >   Systems Operations  >  

Computer Security

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 
Definition continues below.
Computer Security Reports
How Secure Managed File Transfers Help Meet Compliance Requirements
sponsored by Axway
EGUIDE: Access this exclusive e-guide to discover what steps your enterprise should take to ensure secure managed file transfers (MFT) that also meet compliance requirements. You'll also learn how compliance regulations affect file transfer and examine what features to look for in a managed file transfer system.
Posted: 11 Nov 2015 | Published: 11 Nov 2015


Staying One Step Ahead with Zero-Day Protection
sponsored by Check Point Software Technologies Ltd.
WEBCAST: This webcast examines how you can stop today's advanced hackers. Watch and learn how sandboxing, CPU-level detection and more can keep your organization secure from even the most sophisticated threats.
Posted: 16 Nov 2015 | Premiered: Sep 22, 2015

Check Point Software Technologies Ltd.

Case Study: How a Major Media Organization Fought off Hacktivists
sponsored by Akamai
WHITE PAPER: This case study tells how a major media company took steps to successfully keep hacktivists at bay and maintain uptime across 19 digital properties.
Posted: 09 Nov 2015 | Published: 09 Nov 2015


Information Security Asean November 2015
sponsored by TechTarget ANZ
EZINE: The cover story looks at the cyber crime landscape in Singapore and what organisations in the city state are doing to combat it
Posted: 09 Nov 2015 | Published: 09 Nov 2015

Best Practices for Maintaining a Secure Enterprise
sponsored by MASERGY
EGUIDE: Access this guide for essential information on security threats, compliance concerns, and the best practices you need to adopt to overcome them.
Posted: 24 Nov 2015 | Published: 24 Nov 2015


Defending against DDoS Attacks in the Financial Sector
sponsored by Akamai
WHITE PAPER: This white paper discusses how you can protect your financial organization against sophisticated DDoS attacks.
Posted: 17 Nov 2015 | Published: 05 Nov 2015


A Report on the Critical Capabilities Required for High-Security Mobility Management
sponsored by Good Technology
ANALYST REPORT: In this exclusive analyst report, you will learn how to achieve increased protection in mobile markets using a hybrid mix of enterprise mobility management (EMM), platform and security vendors. Read on to ensure your EMM vendor will support business processes without disruptions.
Posted: 23 Nov 2015 | Published: 29 Jul 2015

Good Technology

Maintain Web Security in an Insecure World
sponsored by Akamai
WHITE PAPER: To be successful in today's hyperconnected world, enterprises need to expand their web offerings without constantly watching the door for intruders. This white paper explains how you can do so.
Posted: 23 Nov 2015 | Published: 23 Nov 2015


Best Practices for Securing Workloads in Amazon Web Services
sponsored by
WHITE PAPER: Access this informative resource to explore best practices for securely deploying enterprise workloads in AWS. You'll also learn how these tips can apply to securing workloads in other IaaS strategies.
Posted: 24 Nov 2015 | Published: 15 Apr 2015

The Rising Value - and Falling Cost - of App and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: Access this white paper to examine the business drivers for desktop virtualization and its value for users, businesses, and IT. You'll also learn where costs are falling in the desktop virtualization architecture.
Posted: 12 Nov 2015 | Published: 29 Aug 2014

COMPUTER SECURITY DEFINITION (continued): …  will be compromised by physical theft or an attack by an external hacker . Hardware protection is inherently less vulnerable to software-based attacks and authentication processes are conducted through a secure subsystem. The device also enhances the security of Web browser s, email programs and other important applications.TPM chips are available from a number of vendors, including Atmel, Broadcom, Infineon, Sinosun, STMicroelectronics and Winbond. TPM could, potentially, be used on any type of computing device. The devices are currently being installed on desktops, laptops and tablet PCs by … 
Computer Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement