IT Management  >   Systems Operations  >  

Computer Security

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 
Definition continues below.
Computer Security Reports
The State Of Endpoint Security Adoption 2014 To 2015
sponsored by Dell, Inc. and IntelĀ®
WHITE PAPER: In this special report, Forrester presents data from its most recent surveys to discuss the current state of endpoint security, along with analysis that explains the data in the context of the overall security landscape.
Posted: 06 Oct 2015 | Published: 15 Oct 2014

Dell, Inc. and IntelĀ®

Eliminate Blind Spots in SSL Encrypted Traffic
sponsored by Venafi
WHITE PAPER: This white paper discusses how SSL can leave security blind to incoming attacks and gives suggestions for seeing into these blind spots.
Posted: 16 Sep 2015 | Published: 16 Sep 2015


2014 Report: Enterprise Mobility Management Software Market Shares
sponsored by VMware
WHITE PAPER: This IDC study provides a competitive analysis of the enterprise mobility management (EMM) software market for 2014. In addition to a ranking of the top 15 vendors by revenue, it provides an overview of key market trends and vendors that helped shape the market landscape in 2014.
Posted: 17 Sep 2015 | Published: 17 Sep 2015


Support and Secure Enterprise Applications on All Your Users' Mobile Devices
sponsored by VMware
WHITE PAPER: This white paper highlights a cloud service designed to help organizations leverage O365 on their mobile devices. Discover how to secure all company apps both cloud and on-premise.
Posted: 18 Sep 2015 | Published: 31 Jan 2014


Infographic: Why choose Citrix over VMware?
sponsored by Citrix
RESOURCE: Competing solutions may look similar at a glance, but there are good reasons Citrix is a leader in application virtualization. Here are four of them.
Posted: 17 Sep 2015 | Published: 31 Dec 2014


Scoring the Top Enterprise Mobility Management Suites in 2015
sponsored by VMware
WHITE PAPER: This white paper reviews the 2015 EMM market, and is a guide for organizations looking to introduce EMM into their businesses, as well as for those intending to upgrade mobility services. Access this paper now to analyze the strengths and weaknesses of 11 EMM vendors.
Posted: 18 Sep 2015 | Published: 08 Jun 2015


Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: This white paper discusses the challenges of decryption and gives advice on how you can implement it more effectively.
Posted: 17 Sep 2015 | Published: 20 Jan 2015

Blue Coat Systems

Social Threat Intelligence: A New Approach to Security
sponsored by Threatstream
TRANSCRIPT: This resource discusses social threat intelligence (STI), a collaborative approach to threat intelligence that can help you keep up with new cyber-risks.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


An Innovative Approach to Encrypted Network Security
sponsored by Unisys
VIDEO: This video introduces a new kind of encryption that keeps data on your network and mobile devices more secure while allowing for simple endpoint management and access.
Posted: 30 Sep 2015 | Premiered: 11 Sep 2015


Secure, Efficient File-Sharing
sponsored by FinalCode
VIDEO: This brief video looks at a security system that keeps files safe without changing the way employees share them.
Posted: 05 Oct 2015 | Premiered: 29 May 2015

COMPUTER SECURITY DEFINITION (continued): …  will be compromised by physical theft or an attack by an external hacker . Hardware protection is inherently less vulnerable to software-based attacks and authentication processes are conducted through a secure subsystem. The device also enhances the security of Web browser s, email programs and other important applications.TPM chips are available from a number of vendors, including Atmel, Broadcom, Infineon, Sinosun, STMicroelectronics and Winbond. TPM could, potentially, be used on any type of computing device. The devices are currently being installed on desktops, laptops and tablet PCs by … 
Computer Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement