IT Management  >   Systems Operations  >  

Computer Security

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 
Definition continues below.
Computer SecurityReports
 
After Malware: The Next Mobile Security Battle
sponsored by Sophos, Inc.
WEBCAST: In this webcast, you will find that malware is here to stay, yet it's not the only threat that we need to be aware of. Watch now to understand the battle beyond malware, considering vulnerable applications, advanced adversaries, and the enemy within.
Posted: 17 Jul 2014 | Premiered: Jul 7, 2014

Sophos, Inc.

Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management
sponsored by FrontRange Solutions Inc.
WHITE PAPER: In this white paper, explore several best practises that should be implemented to support workforce mobility.
Posted: 24 Jul 2014 | Published: 31 Dec 2013

FrontRange Solutions Inc.

The Devices Are Coming! How the "Internet of Things" Will Affect IT
sponsored by Cox Communications, Inc.
WHITE PAPER: This informative report provides insight into what others are (or aren't) doing to prepare for the invasion of internet-connected devices in the workplace, as well as the changes that your enterprise should anticipate in the coming years.
Posted: 16 Jul 2014 | Published: 31 May 2014

Cox Communications, Inc.

VMware SDDC: IT Architecture for the Cloud Era
sponsored by Symantec
VIDEO: This white paper explores the benefits of building a software-defined data center to handle the challenges and demands of the modern data center.
Posted: 24 Jul 2014 | Premiered: 17 Dec 2013

Symantec

IBM X-Force Threat Intelligence Quarterly, 6/14: The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

BMO Harris Bank Case Study
sponsored by EMC Corporation
WEBCAST: This video explains how BMO Harris Bank found a storage solution with easy access that provided them with immediate savings of $5 million a year. Watch to find out how you can deploy the same solution with an easy to use interface and quickly lower costs.
Posted: 29 Jul 2014 | Premiered: Jul 29, 2014

EMC Corporation

Gaining Control of the Cloud
sponsored by Gravitant
WHITE PAPER: This whitepaper covers how you can identify risks in the public cloud and offers a software solution to help keep you safe.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Gravitant

At Last, Profitable Endpoint Security for MSPs
sponsored by Webroot
WHITE PAPER: This white paper introduces one company's cloud-driven, cost-effective solution to the challenges that MSPs have long faced when it comes to providing endpoint security services.
Posted: 18 Jul 2014 | Published: 31 Oct 2013

Webroot

The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report
sponsored by Neustar┬«
WHITE PAPER: This white paper reveals valuable insights into the impact of DDoS smokescreening based on a survey of 440 North American companies.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Neustar®

Survey: Can Security in Higher Education Be Both Open and Secure?
sponsored by AlienVault
WHITE PAPER: This report contains data collected by SANS regarding the successes and challenges that colleges and universities experience in protecting their environments from threats, and also provides advice for security professionals working in these environments to improve their tactics in this critical area.
Posted: 23 Jul 2014 | Published: 30 Jun 2014

AlienVault
 
 
COMPUTER SECURITY DEFINITION (continued): …  will be compromised by physical theft or an attack by an external hacker . Hardware protection is inherently less vulnerable to software-based attacks and authentication processes are conducted through a secure subsystem. The device also enhances the security of Web browser s, email programs and other important applications.TPM chips are available from a number of vendors, including Atmel, Broadcom, Infineon, Sinosun, STMicroelectronics and Winbond. TPM could, potentially, be used on any type of computing device. The devices are currently being installed on desktops, laptops and tablet PCs by … 
Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement