IT Management  >   Systems Operations  >  

Computer Security

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 
Definition continues below.
Computer Security Reports
 
Safety Meshing: Hybrid trust models in social networks for end-to-end encryption
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

ComputerWeekly.com

Germany: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
RESOURCE: Check out this resource to uncover cyber threat statistics in Germany broken up by source ranking, location and more.
Posted: 13 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems

Defender Lifecycle Model
sponsored by Gigamon
RESOURCE: In this short solution brief, learn how the Defender Lifecycle Model can help network viability to automate and accelerate the identification of threats.
Posted: 19 Sep 2017 | Published: 31 Aug 2017

Gigamon

Automate Log Management to Meet NIST 800-53 Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST 800-53 requirements. Explore how a log management and analysis platform can help your company meet or exceed these guidelines.
Posted: 15 Sep 2017 | Published: 31 Dec 2014

LogRhythm, Inc.

Cloud Workload Protection Automates AWS Cloud Security
sponsored by AWS - Symantec
WHITE PAPER: Deploying the automated Symantec Cloud Workload Protection (CWP) security solution on Amazon Web Services (AWS) can help your organization gain better visibility into your entire cloud environment, which often help business agility, reduces risk, and is cost-effective.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

AWS - Symantec

The Total Economic Impactâ„¢ Of Microsoft Windows Defender Advanced Threat Protection
sponsored by Microsoft
RESEARCH CONTENT: This Forrester Consulting report examines the ROI for organizations that used Windows Defender ATP to detect and respond to data breaches on their networks.
Posted: 15 Sep 2017 | Published: 31 Jul 2017

Microsoft

Netherlands: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
RESOURCE: Discover which company sizes amongst industries receive the most malware, phishing, and spam attacks.
Posted: 12 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems

Is DNS Your Security Achilles Heel?
sponsored by Akamai Technologies
WHITE PAPER: This white paper explains how many attackers take advantage of recursive DNS, which almost every action on the internet relies on. Uncover 6 best practices you can follow to mitigate the risks.
Posted: 19 Sep 2017 | Published: 31 Jul 2017

Akamai Technologies

Combining Data Loss Protection with Cloud Access Security Broker Technology
sponsored by Symantec
WHITE PAPER: Inside, learn how you can take an advanced data loss protection software even further by infusing it with a cloud access security broker system to help you discover shadow IT, manage data loss protection in the cloud from one console, and more.
Posted: 14 Sep 2017 | Published: 14 Sep 2017

Symantec

The 12 Critical Questions you Need to Ask when Choosing an AD Bridge Solution
sponsored by One Identity
WHITE PAPER: Most enterprises today have heterogeneous IT environments, with Microsoft Active Directory (AD) providing Windows access for most users. Read this white paper to identify a number of key questions to ask when evaluating which AD bridge solution is right for you.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

One Identity
 
 
COMPUTER SECURITY DEFINITION (continued): …  will be compromised by physical theft or an attack by an external hacker . Hardware protection is inherently less vulnerable to software-based attacks and authentication processes are conducted through a secure subsystem. The device also enhances the security of Web browser s, email programs and other important applications.TPM chips are available from a number of vendors, including Atmel, Broadcom, Infineon, Sinosun, STMicroelectronics and Winbond. TPM could, potentially, be used on any type of computing device. The devices are currently being installed on desktops, laptops and tablet PCs by … 
Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement