IT Management  >   Systems Operations  >  

Computer Security

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 
Definition continues below.
Computer Security Reports
 
Strengthen your Next-Generation Malware Analysis
sponsored by Blue Coat Systems
WHITE PAPER: In this brief infographic, discover how malware analysis and content filtering can help you achieve advanced threat protection.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Blue Coat Systems

Managed, Shared Resources: Public Cloud
sponsored by Dimension Data
WHITE PAPER: In this white paper, discover how one public cloud service in particular remains secure, scalable and convenient, and find out how it can pay off for your business.
Posted: 09 Apr 2015 | Published: 09 Apr 2015

Dimension Data

Cybersecurity Strategies for the Midsize Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper examines the steps and technologies security managers for small- to mid-size organizations can leverage at each stage of an attack - before, during and after - in order to effectively secure endpoints and crucial data effectively.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Cisco Systems, Inc.

Point-of-Sale Security for Dummies
sponsored by Bit9 + Carbon Black
RESOURCE: Access this popular resource to find out how you can protect transactions at the point of sale.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

Bit9 + Carbon Black

The Real Cost of Driverless Cars for Cybersecurity and Reliability
sponsored by Rogue Wave Software
WHITE PAPER: Several car manufacturers predict that self-driving cars will be on the road by 2020. What are the implications of the rapid increase in automotive software complexity for cybersecurity and reliability as development teams race to deliver this content?
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Rogue Wave Software

How to Enable Mobile Productivity with Limited IT Resources
sponsored by BlackBerry
WEBCAST: Access this webcast now to learn how you can enjoy affordable mobile device management capable of providing easy app deployment, shared network storage, and security you can trust.
Posted: 22 Apr 2015 | Premiered: Apr 22, 2015

BlackBerry

Cloud Security Survey Report 2015
sponsored by CloudPassage
ANALYST REPORT: This comprehensive survey details what information security professionals believe is the current state of cloud security.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

CloudPassage

Critical Factors to Endpoint Security
sponsored by Dell, Inc. & IntelĀ®
WHITE PAPER: Endpoints are the new security perimeter, and this means rethinking your endpoint security. This white paper will help you do so.
Posted: 24 Apr 2015 | Published: 31 Dec 2013

Dell, Inc. & IntelĀ®

Turning Compliance into an Opportunity
sponsored by Hewlett-Packard Limited
VIDEO: Take a look at this video to discover how you can make compliance more efficient and turn regulations into helps instead of hindrances.
Posted: 09 Apr 2015 | Premiered: 09 Apr 2015

Hewlett-Packard Limited

Understanding what your endpoint security policy needs
sponsored by GeoTrust, Inc.
EGUIDE: This expert guide examines the effectivenss of anti-virus software in the age of advanced threats.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

GeoTrust, Inc.
 
 
COMPUTER SECURITY DEFINITION (continued): …  will be compromised by physical theft or an attack by an external hacker . Hardware protection is inherently less vulnerable to software-based attacks and authentication processes are conducted through a secure subsystem. The device also enhances the security of Web browser s, email programs and other important applications.TPM chips are available from a number of vendors, including Atmel, Broadcom, Infineon, Sinosun, STMicroelectronics and Winbond. TPM could, potentially, be used on any type of computing device. The devices are currently being installed on desktops, laptops and tablet PCs by … 
Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement