IT Management  >   Systems Operations  >  

Computer Security

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 
Definition continues below.
Computer Security Reports
 
Magic Quadrant for Network Access Control
sponsored by ForeScout Technologies, Inc.
ANALYST REPORT: This analyst report from Gartner evaluates and compares 10 top network access control (NAC) vendors. Read on to learn the strengths and weaknesses of each vendor in order to discover which NAC vendor is the best fit for your enterprise's network security needs.
Posted: 16 Feb 2015 | Published: 10 Dec 2014

ForeScout Technologies, Inc.

Mobile Security Matures: Managing the new mobile enterprise 2.0
sponsored by SearchSecurity.com
VIRTUAL TRADESHOW: This virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com provides attendees with strategies for effectively adapting and satisfying end-users' growing BYOD demands, while still allowing for enterprise IT to securely control desktop and application delivery, without exposing your organization to security threats.
Posted: 27 Feb 2015 | Premieres: Apr 15, 2015, 08:15 EDT (12:15 GMT)

SearchSecurity.com

Cloud Security in an Agile World
sponsored by Rackspace
WHITE PAPER: This white paper tells you exactly what those precautions are and how to take them when dealing with the cloud.
Posted: 20 Feb 2015 | Published: 31 Dec 2014

Rackspace

BYOD and Beyond: Balancing User and Enterprise Needs in Mobile Security Policy
sponsored by SearchConsumerization.com
EBOOK: Bring your own device policies are a key part of any enterprise mobility strategy, but that's just the start. BYOD policies must address acceptable use, enforcement and privacy.
Posted: 20 Feb 2015 | Published: 20 Feb 2015


A Guide to Cyber Security that Fights the Worst Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this informative white paper to find out what cyber threats are emerging as key players and what you can do to stop them.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

LogRhythm, Inc.

Why DNS Security is Essential
sponsored by Cloudmark
WHITE PAPER: This white paper covers exactly how attackers use DNS to compromise a network.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Cloudmark

Collaboration—Understand the Business Value and How to Make It Work
sponsored by Unify
WHITE PAPER: View this informative white paper to get some insight and an information framework to aid in successful planning and deployment of collaboration solutions.
Posted: 16 Feb 2015 | Published: 31 Oct 2014

Unify

Buyer's Essential: What to Look for In Threat Intelligence Services
sponsored by SearchSecurity.com
EBOOK: This Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from the adding a threat intelligence feed to your security system.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

SearchSecurity.com

The Value in Threat Intelligence Information
sponsored by Webroot
EGUIDE: This expert guide describes the pros and cons of threat intelligence and helps you decide if it's right for your company.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Webroot

Next Generation Firewalls: What Can They Do for You?
sponsored by Cisco
EGUIDE: In this expert guide you can find tips on assessing your security needs and deciding if a next generation firewall is a smart choice for you.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Cisco
 
 
COMPUTER SECURITY DEFINITION (continued): …  will be compromised by physical theft or an attack by an external hacker . Hardware protection is inherently less vulnerable to software-based attacks and authentication processes are conducted through a secure subsystem. The device also enhances the security of Web browser s, email programs and other important applications.TPM chips are available from a number of vendors, including Atmel, Broadcom, Infineon, Sinosun, STMicroelectronics and Winbond. TPM could, potentially, be used on any type of computing device. The devices are currently being installed on desktops, laptops and tablet PCs by … 
Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement