IT Management  >   Systems Operations  >  

Computer Security

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 
Definition continues below.
Computer Security Reports
 
How To Recover Data From Server Failure
sponsored by Quest
PRODUCT OVERVIEW: When a server fails, you need data restored in minutes rather than hours in order to minimize the impact to the business. Inside this technical brief, learn about a tool by Quest that can help you recover data and apps from a server failure in a few simple steps.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Quest

5 Reasons Why Mobile Will Transform Enterprise Authentication
sponsored by Entrust, Inc.
WHITE PAPER: Mobile presents unique security considerations for enterprises, but if handled properly these challenges can be mitigated and pave the way for mobile to become a trusted, convenient and multi-purpose enterprise digital ID. Access this white paper to learn 5 reasons why mobile will transform business authentication.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Entrust, Inc.

Understanding the IoT Explosion and Its Impact on Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Understanding and leveraging the explosive growth and innovation of the Internet of Things is vital if an organization is striving for success. But how do you take advantage of it without introducing security risks? Delve into the complexities of IoT including security, data management, trends, and more.
Posted: 16 Mar 2017 | Published: 16 Mar 2017

Fortinet, Inc.

Office 365: How to Deploy Truly Comprehensive Security
sponsored by Proofpoint, Inc.
RESOURCE: Find 10 tips for securing Office 365, including considerations for deploying effective email protection, blocking credential phishing, preventing business email compromise, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Proofpoint, Inc.

Symantec Data Loss Prevention Solution
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Sensitive information is leaving the safety of your corporate network and flying into the cloud where traditional security approaches hold little sway. Learn how to manage and protect your information in the modern, cloud-driven environment.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

Symantec & Blue Coat Systems

The Benefits of Public Cloud for Data Protection
sponsored by Quest
WHITE PAPER: Learn about another opportunity to use public cloud to make existing IT better. Uncover how to leverage the public cloud, or infrastructure-as-a-service (IaaS), for backup and recovery enabled data protection.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

Quest

Building a Trusted Foundation for the Internet of Things
sponsored by Gemalto
WHITE PAPER: In this white paper find how to set up your enterprise for future Internet of Things success, how to handle common problems, and what the future looks like for IoT.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

CW ASEAN March 2017: Raising national security standards
sponsored by TechTarget ANZ
EZINE: In this month's CW ASEAN, we describe how Singapore is improving its cyber security defenses and preparations through a partnership with British security company BAE Systems.
Posted: 10 Mar 2017 | Published: 09 Mar 2017


Safeguard Data Stored and Managed in Cloud Environments
sponsored by Gemalto
WHITE PAPER: This white paper will serve as a measuring stick for your current encryption as well as a template to take it to the next level. To truly keep company data safe from unauthorized access you'll need an encryption strategy that considers every facet of the process: from the coding of the data to the creation and management of the encryption keys.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto

Unified Endpoint Management - Security and Productivity for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: Discover a UEM solution that provides a single pane of glass to manage and secure, devices and operating systems, whether laptops, smart phones, tablets or any other device.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Citrix
 
 
COMPUTER SECURITY DEFINITION (continued): …  will be compromised by physical theft or an attack by an external hacker . Hardware protection is inherently less vulnerable to software-based attacks and authentication processes are conducted through a secure subsystem. The device also enhances the security of Web browser s, email programs and other important applications.TPM chips are available from a number of vendors, including Atmel, Broadcom, Infineon, Sinosun, STMicroelectronics and Winbond. TPM could, potentially, be used on any type of computing device. The devices are currently being installed on desktops, laptops and tablet PCs by … 
Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement