IT Management  >   Systems Operations  >  

Computer Security

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 
Definition continues below.
Computer SecurityReports
 
Achieve Enterprise-wide Network Visibility with Monitoring Tool
sponsored by LogRhythm, Inc.
PRODUCT LITERATURE: True enterprise security intelligence requires real-time awareness and an understanding of all data traversing the network. The LogRhythm Network Monitor provides both application level awareness and rich network session details, delivering enterprise-wide network visibility. View this datasheet to learn more about this network monitoring tool.
Posted: 25 Jul 2014 | Published: 31 Mar 2014

LogRhythm, Inc.

Upgrading and Improving the Trust of Microsoft Windows Certificate Authorities
sponsored by Thales
WHITE PAPER: In this white paper, discover the history of Microsoft Windows 2003 Server, including the cryptographic landscape when it was introduced and the improvements along the way.
Posted: 15 Jul 2014 | Published: 01 Jun 2014

Thales

A Security Operations Center for Small and Mid-Sized Enterprises
sponsored by AlienVault
WHITE PAPER: This white paper reviews one company's security operations center, which is renowned for being tailored to small and medium-sized businesses (SMBs), with a host of additional features.
Posted: 24 Jul 2014 | Published: 26 Mar 2014

AlienVault

Threat Intelligence: The Key to a Complete Vulnerability Management Strategy
sponsored by AlienVault
WEBCAST: This webcast provides insight into rethinking vulnerability management. It also reviews the common challenges of vulnerability management and ways to overcome those challenges.
Posted: 18 Jul 2014 | Premiered: Jul 18, 2014

AlienVault

Applying Innovation and Expertise to Enterprise Security
sponsored by CDW Corporation
WHITE PAPER: This helpful white paper introduces one renowned company's security solutions, which cover risk and compliance from end to end.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

CDW Corporation

5 DBA Mistakes That Can Cost You Your Job
sponsored by Idera
WHITE PAPER: This white paper reveals the 5 unforgivable mistakes that could endanger the integrity, recoverability and security of the databases, including SQL Server, DMAs are supposed to protect.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

Idera

Firms Turn To Next-Generation Firewalls To Tackle Evolving IT Threats
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper summarizes a number of insights on current security challenges for enterprises and the ways that next-generation firewalls (NGFWs) are being applied as a solution.
Posted: 28 Jul 2014 | Published: 30 Apr 2014

Fortinet, Inc.

Easy-to-Manage Security Solutions for Today's Threats and Technologies
sponsored by CDW Corporation
WHITE PAPER: This informative white paper describes one company's easy-to-manage security solutions, which are prepared to confront today's evolving threats and emerging technologies.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

CDW Corporation

Security Solutions for Every Layer of Your IT Environment
sponsored by CDW Corporation
RESOURCE: View this infographic now to learn about critical security concerns within every layer of your IT environment and the steps that you can take to prevent these dangerous threats.
Posted: 16 Jul 2014 | Published: 16 Jul 2014

CDW Corporation

Webcast: Security Threat Intelligence
sponsored by CDW Corporation
WEBCAST: This web seminar provides an overview of the current malware landscape, including a discussion of the impact that data breaches have on businesses today.
Posted: 18 Jul 2014 | Premiered: Apr 30, 2014

CDW Corporation
 
 
COMPUTER SECURITY DEFINITION (continued): …  will be compromised by physical theft or an attack by an external hacker . Hardware protection is inherently less vulnerable to software-based attacks and authentication processes are conducted through a secure subsystem. The device also enhances the security of Web browser s, email programs and other important applications.TPM chips are available from a number of vendors, including Atmel, Broadcom, Infineon, Sinosun, STMicroelectronics and Winbond. TPM could, potentially, be used on any type of computing device. The devices are currently being installed on desktops, laptops and tablet PCs by … 
Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement