IT Management  >   Systems Operations  >  

Computer Security

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 
Definition continues below.
Computer Security Reports
The State Of Endpoint Security Adoption 2014 To 2015
sponsored by Dell, Inc. and Intel®
WHITE PAPER: In this special report, Forrester presents data from its most recent surveys to discuss the current state of endpoint security, along with analysis that explains the data in the context of the overall security landscape.
Posted: 06 Oct 2015 | Published: 15 Oct 2014

Dell, Inc. and Intel®

Web application firewall provides continuous web app protection
sponsored by Trustwave
PRODUCT OVERVIEW: Access this white paper to learn about a web application firewall appliance that provides real-time, continuous security against attacks and data loss and assures that your web applications operate as intended and are compliant with industry regulations and discover how you can protect against the loss of sensitive information.
Posted: 06 Oct 2015 | Published: 31 Dec 2014


An Executive's Guide to Budgeting for SIEM Systems
sponsored by Trustwave
WHITE PAPER: This white paper calculates how much in-house SIEMs and managed SIEM services cost an enterprise, helping you determine which option is most cost-effective for your business.
Posted: 30 Sep 2015 | Published: 30 Sep 2015


Best of VMworld 2015 Award Winners
sponsored by arcserve
EGUIDE: The Best of VMworld 2015 Awards recognize the most innovative new products in the server virtualization, cloud and end-user computing markets. A panel of expert judges evaluated 153 nominated products on display at VMworld 2015 and named winners in seven categories. Download now to find out what made the list.
Posted: 28 Sep 2015 | Published: 28 Sep 2015


Bypassing Security Policies using Insufficient Authorization
sponsored by WhiteHat Security
WEBCAST: This recording of a live webcast discusses the details of how Insufficient Authorization attacks work.
Posted: 01 Oct 2015 | Premiered: Apr 14, 2015

WhiteHat Security

Case Study: Centralizing Endpoint Management for Peak Performance
sponsored by Earthlink.
WHITE PAPER: This case study tells how a global consulting firm consolidated endpoint security for 85 different offices and achieved one-stop visibility and management for mobile endpoints.
Posted: 18 Sep 2015 | Published: 18 Sep 2015


Sizing The Cloud Security Market
sponsored by HyTrust
WHITE PAPER: This report by Forrester Research organizes today's fragmented set of cloud security solutions into four discrete categories for S&R pros and projects spending patterns for the cloud security category as a whole.
Posted: 05 Oct 2015 | Published: 25 Aug 2015


Delivering Cloud-Based Mobile Apps to the Enterprise
sponsored by Dimension Data
EGUIDE: In this exclusive e-guide, learn expert tips for delivering cloud-based mobile apps to the enterprise. Read on to discover the two basic models for application delivery clouds and how the hybrid cloud is becoming an increasingly popular choice for enterprise mobile cloud delivery.
Posted: 25 Sep 2015 | Published: 25 Sep 2015

Dimension Data

The Essential Guide to Microsoft Azure Compliance
sponsored by Softchoice Corporation
ESSENTIAL GUIDE: Access this essential guide to dive deep into security, compliance, and regulations with Microsoft Azure and examine how Azure handles major compliance and regulation concerns – including those for PCI, HIPPA, and more.
Posted: 02 Oct 2015 | Published: 02 Oct 2015

Softchoice Corporation

Building a Custom Defense for Today's Security Threats
sponsored by Trend Micro
WHITE PAPER: This white paper offers a series of solutions designed to help your organization prevent the potential consequences of advanced threats.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

Trend Micro
COMPUTER SECURITY DEFINITION (continued): …  will be compromised by physical theft or an attack by an external hacker . Hardware protection is inherently less vulnerable to software-based attacks and authentication processes are conducted through a secure subsystem. The device also enhances the security of Web browser s, email programs and other important applications.TPM chips are available from a number of vendors, including Atmel, Broadcom, Infineon, Sinosun, STMicroelectronics and Winbond. TPM could, potentially, be used on any type of computing device. The devices are currently being installed on desktops, laptops and tablet PCs by … 
Computer Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement