IT Management  >   Systems Operations  >  

Computer Security

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 
Definition continues below.
Computer Security Reports
 
Securing Operational Technology in the Pharmaceutical and Chemical Manufacturing Industries
sponsored by Bayshore Networks
WHITE PAPER: In this white paper, gain a stronger understanding of the cyber security implications of IoT devices in pharmaceutical and chemical manufacturing. Uncover 4 key considerations for protecting against cyber threats when leveraging the IIoT.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Bayshore Networks

Beyond the Router: Architecting an Application-Driven WAN Edge
sponsored by Silver Peak
WHITE PAPER: In this white paper, gain a stronger understanding of the benefits associate with moving towards a software-defined, application-driven WAN.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Silver Peak

Preparing for the General Data Protection Regulation
sponsored by Fortinet, Inc.
WHITE PAPER: Gain a stronger understanding of GDPR compliance and implications for your network security.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Fortinet, Inc.

Cloud usage is now more than 90%, but IT is struggling to keep up. Are you?
sponsored by McAfee, Inc.
RESOURCE: 93% of organizations are utilizing some form of cloud service, but 49% are delaying cloud deployments due to a gap in cybersecurity skills. Review this infographic to learn where the primary security concerns lie and how to keep cloudy skies from raining.
Posted: 16 Nov 2017 | Published: 31 Jan 2017

McAfee, Inc.

Hill Country Memorial Hospital Case Study
sponsored by D-Link
CASE STUDY: Hill Country Memorial Hospital needed to upgrade its analog cameras and improve security across its campus. Access this case study to learn how they were able to implement an intelligent mix of indoor/ outdoor IP cameras plus video management software and achieve excellent resolution and complete campus coverage.
Posted: 16 Nov 2017 | Published: 16 Nov 2017

D-Link

Protecting Endpoints Everywhere
sponsored by Cisco Umbrella
EBOOK: In this e-book, gain a closer look at how security challenges have evolved and the steps your organization can take to ensure end-to-end security, especially as IoT and mobile device continue to grow.
Posted: 07 Nov 2017 | Published: 07 Nov 2017

Cisco Umbrella

Understanding Software-Defined Security in Modern Software-DefinedNetworks
sponsored by Juniper Networks, Inc.
RESEARCH CONTENT: Read this ESG research report to discover the cybersecurity challenges that businesses are struggling to overcome like organizational silos and manual processes. Then, learn how the software-defined security network can solve these problems.
Posted: 06 Nov 2017 | Published: 31 Jan 2017

Juniper Networks, Inc.

KuppingerCole Report Leadership Compass
sponsored by CyberArk Software, Inc and KuppingerCole
WHITE PAPER: Privilege management is among the most relevant areas of IAM and cybersecurity, given that privileged users are a primary target of attackers. Explore this 55 page market report to learn more about privilege management and how you can protect your enterprise to the fullest extent against attackers.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

CyberArk Software, Inc and KuppingerCole

Basic SIEM Analytics Steps to Know
sponsored by TechTarget
RESOURCE: All SIEM products provide basic data analytics capabilities, but you may be able to improve the effectiveness and efficiency of these capabilities through some relatively small changes. Inside this guide, experts Karen Scarfone and Johna Johnson reveal tips on how to filter through data securely and catch threats before they harm your organization.
Posted: 02 Nov 2017 | Published: 02 Nov 2017

TOPICS:  Security
TechTarget

Marcher Marches On: The Anatomy of a Banker Malware
sponsored by Check Point Software Technologies Ltd.
RESOURCE: Inside, get a breakdown of the mobile banking malware known as Marcher. Learn how Marcher gets into mobile devices using flash phishing, what harm it can cause once inserted into your device, and more.
Posted: 20 Oct 2017 | Published: 28 Apr 2016

Check Point Software Technologies Ltd.
 
 
COMPUTER SECURITY DEFINITION (continued): …  will be compromised by physical theft or an attack by an external hacker . Hardware protection is inherently less vulnerable to software-based attacks and authentication processes are conducted through a secure subsystem. The device also enhances the security of Web browser s, email programs and other important applications.TPM chips are available from a number of vendors, including Atmel, Broadcom, Infineon, Sinosun, STMicroelectronics and Winbond. TPM could, potentially, be used on any type of computing device. The devices are currently being installed on desktops, laptops and tablet PCs by … 
Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement