IT Management  >   Systems Operations  >  

Computer Security

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 
Definition continues below.
Computer Security Reports
 
Improving Passwords is Critical to Modern Security
sponsored by Verizon
VIDEO: Discover how hackers gain access to your networks using password vulnerabilities. In this short video you'll find out how to begin improving your defenses based on this prevalent, but easily manageable, vulnerability.
Posted: 27 Jun 2016 | Premiered: 04 May 2016

Verizon

South Carolina Federal Credit Union
sponsored by Array Networks
CASE STUDY: When converting to an SSL-secured environment, your business must have the correct application delivery controller (ADC) employed to ensure server performance. Make an informed decision when selecting your ADC, by reading this case study that explains how one business benefitted from implementing one.
Posted: 29 Jun 2016 | Published: 28 Jun 2016

Array Networks

Hackers Are Poised to Compromise Your Communications Networks
sponsored by MASERGY
WHITE PAPER: VoIP technology has introduced new security concerns to the enterprise. Access this white paper now to learn about today's 9 most serious security concerns introduced by VoIP, and how to counteract them.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

MASERGY

Taking a Decisive Stand against Fraud
sponsored by CyberSource
CASE STUDY: Learn how MetroDeal secured its site against a steadily growing level of fraud risk, and freed up staff time as an ancillary benefit. Access now to learn about the value they gained by taking a comprehensive stand against fraud.
Posted: 23 Jun 2016 | Published: 30 Aug 2013

CyberSource

Definitive Guide: Securing the Mobile Enterprise
sponsored by Aruba Networks
WHITE PAPER: While mobility and IoT offer potential rewards for organizations the thought of all of these unknown devices connecting to the network can be worrisome for security and IT managers This informational white paper offers an outline for the pre-planning and deployment steps needed to help guide you on your journey of enterprise BYOD and IoT.
Posted: 15 Jul 2016 | Published: 15 Jul 2016

Aruba Networks

3 Steps to Taking Control of SaaS Apps
sponsored by Palo Alto Networks
WHITE PAPER: In this tech brief, you'll find a quick 3-step guide to get SaaS under control and prevent threats.
Posted: 01 Jul 2016 | Published: 01 Jul 2016

Palo Alto Networks

OpenDNS Umbrella
sponsored by OpenDNS
VIDEO: Learn about a first line of defense that can protect your IT infrastructure and monitor for emergent threats.
Posted: 25 Jul 2016 | Premiered: 31 May 2016

OpenDNS

Defending the Indefensible: Preparing for an Uncertain Digital Future
sponsored by LogRhythm, Inc.
WHITE PAPER: The following discussion explores fundamental challenges in enforcing cybersecurity measures, the financial burden of prevailing security approaches, and suggested solutions to overcome vulnerabilities in existing infrastructures. Access now to learn what CSOs are saying about the state of corporate cybersecurity.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

LogRhythm, Inc.

Is UTM Ready for the Big Leagues?
sponsored by SearchSecurity.com
EBOOK: This Technical Guide reviews advanced UTM and what elements make for a truly enterprise-class UTM device.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

SearchSecurity.com

The Benefits of Using an Appliance to Simplify and Accelerate Desktop Virtualization Initiatives
sponsored by Dell, Inc. and IntelĀ®
WHITE PAPER: Discover the market forces spurring the growing demand for desktop virtualization, explore the advantages an appliance has on desktop virtualization deployments, and learn what fundamentals to look for in a desktop virtualization appliance.
Posted: 18 Jul 2016 | Published: 18 Jul 2016

Dell, Inc. and IntelĀ®
 
 
COMPUTER SECURITY DEFINITION (continued): …  will be compromised by physical theft or an attack by an external hacker . Hardware protection is inherently less vulnerable to software-based attacks and authentication processes are conducted through a secure subsystem. The device also enhances the security of Web browser s, email programs and other important applications.TPM chips are available from a number of vendors, including Atmel, Broadcom, Infineon, Sinosun, STMicroelectronics and Winbond. TPM could, potentially, be used on any type of computing device. The devices are currently being installed on desktops, laptops and tablet PCs by … 
Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement