IT Management  >   Systems Operations  >  

Computer Security

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 
Definition continues below.
Computer SecurityReports
 
Top 3 Strategies to Reduce Risk in Automotive / In-Vehicle Software Development
sponsored by Rogue Wave Software
WHITE PAPER: This white paper explores 3 of the biggest challenges exacerbated by today's complexity and connectivity trends that face automotive software teams. Learn how embedded development systems can help improve code quality, safety, and compliance throughout the development cycle.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Rogue Wave Software

Computer Weekly – 23 September 2014: Nato and business join forces to tackle cyber security threats
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how Nato wants to work with businesses to tackle their common cyber security threat. Is Amazon becoming the new Microsoft? We examine the historic similarities between the two suppliers. And airline easyJet talks about putting hybrid cloud into action. Read the issue now.
Posted: 22 Sep 2014 | Published: 23 Sep 2014

ComputerWeekly.com

Antivirus Alternatives: Evolving Enterprise Endpoint Security Strategy
sponsored by N-able Technologies
EGUIDE: In this e-Guide, security expert Matt Pascucci introduces an innovative strategy to fight malware that looks beyond antivirus systems, exploring alternative security measures at the cloud, network, and endpoint layers.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

N-able Technologies

Financial Services Company Saves $5M Annually with iovation's Fraud Prevention Service
sponsored by iovation, Inc.
CASE STUDY: In this case study, discover how a financial services company was able to utilize a fraud prevention service that would protect customers and battle sophisticated loan fraud.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

iovation, Inc.

5 Ways That Wire Data Analytics Enables Real-Time Healthcare Systems
sponsored by ExtraHop
WHITE PAPER: This white paper describes the benefits of the real-time healthcare system, and how one company is using wire data analytics to empower healthcare IT and provide unprecedented insight into all of an organization's wire data.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

ExtraHop

Cloud Application Security Requires Visibility and Control
sponsored by CipherCloud
VIDEO: Tune in to this video to find out how to gain visibility and control over your cloud applications with an easy to deploy solution.
Posted: 23 Sep 2014 | Premiered: 23 Sep 2014

CipherCloud

English and French Collaboration Opens Education Cloud Portal to Many Countries
sponsored by CipherCloud
WHITE PAPER: This case study focuses on a UK educational organization who strives to create a secure portal in the cloud, compatible with global partners in order to access educational tools.
Posted: 23 Sep 2014 | Published: 23 Sep 2014

CipherCloud

Four steps to ensure IT investments benefit regulatory compliance
sponsored by Hewlett-Packard Company
EGUIDE: In this expert e-guide, discover how companies can ensure new IT investments meet the business's regulatory needs in four simple steps.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

Hewlett-Packard Company

DDos Survival Handbook
sponsored by Singlehop
WHITE PAPER: This handbook is the survival guide to fight off cyber attackers and mitigate the risk of DDoS attacks.
Posted: 29 Sep 2014 | Published: 31 Dec 2013

Singlehop

Security in the New Mobile Ecosystem Ponemon Institute
sponsored by Raytheon Trusted Computer Solutions
WHITE PAPER: This study takes a look at over 600 IT security professionals who are highly involved in their organizations' mobile and enterprise security activities, and explains the current security status of mobile devices in the workplace.
Posted: 01 Oct 2014 | Published: 31 Aug 2014

Raytheon Trusted Computer Solutions
 
 
COMPUTER SECURITY DEFINITION (continued): …  will be compromised by physical theft or an attack by an external hacker . Hardware protection is inherently less vulnerable to software-based attacks and authentication processes are conducted through a secure subsystem. The device also enhances the security of Web browser s, email programs and other important applications.TPM chips are available from a number of vendors, including Atmel, Broadcom, Infineon, Sinosun, STMicroelectronics and Winbond. TPM could, potentially, be used on any type of computing device. The devices are currently being installed on desktops, laptops and tablet PCs by … 
Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement