IT Management  >   Systems Operations  >  

Computer Security

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 
Definition continues below.
Computer Security Reports
 
4 Ways to Reduce the Risk of Ransomware
sponsored by Citrix
WHITE PAPER: In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

AWS Agility + Splunk Visibility = Cloud Success
sponsored by Splunk
RESOURCE: Download this infographic to discover the app that provides countless possibilities for operational and security visibility in the cloud on AWS.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

Splunk

Passwords are Out: But What's Replacing Them?
sponsored by Crossmatch
WEBCAST: Join experts Keven Beaver and Jeff Carpenter in this webcast as they discuss why passwords are obsolete and what the "human-proofed" future of authentication will look like.
Posted: 24 Jul 2017 | Premiered: Jun 29, 2017

Crossmatch

Composite Authentication: Security Beyond Passwords
sponsored by Crossmatch
WEBCAST: In this webcast, security experts Kevin Beaver and Jeff Carpenter discuss what composite authentication is, how it evolved, and its place in the future of security.
Posted: 21 Jul 2017 | Premiered: Jun 29, 2017

Crossmatch

How to Ensure Secure and Compliant Cloud App Use
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Cloud applications are becoming more vital to business, but securing them can be tricky. Discover 6 key guidelines to maximize the effectiveness of your CASB to help you remain secure and compliant with cloud apps.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Symantec & Blue Coat Systems

The Case for Cloud-Based IAM
sponsored by OneLogin
WHITE PAPER: What's the future of IAM? Is it on the cloud? What are the benefits? IAM expert David Meyer discusses why traditional IAM is no longer sufficient for enterprises today and how cloud-based IAM can meet your organization's security needs.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

OneLogin

How to Use Detection and Response to Reduce Business Risk
sponsored by Dell SecureWorks
WHITE PAPER: Use this white paper to learn how you can reduce the impact of threats to your organization by leveraging security monitoring systems to improve response times, proactively respond to breaches, and more.
Posted: 20 Jul 2017 | Published: 20 Jul 2017

Dell SecureWorks

Creating an Organisational-Wide Culture of Security
sponsored by Dell SecureWorks
WHITE PAPER: When the winds of IT trends change, your security system needs to be able to change with them. Click inside to learn why an effective communication workflow is key to building an organization-wide culture around cybersecurity.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Dell SecureWorks

How to Secure IoT, Mobile, and Endpoints
sponsored by IBM
WHITE PAPER: As devices continue to expand, maintaining security becomes a larger challenge. Access this white paper to discover how to manage and secure a diverse pool of endpoints.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

IBM

Ransomware and Cloud Security: Keys to Stop the Threat
sponsored by Cisco Umbrella
EGUIDE: Around the clock security attacks are becoming more challenging and creative. Inside this e-guide, information security consultant Kevin Beaver reveals 5 ways to prevent a ransomware infection through network security and Kathleen Casey uncovers 5 ways to fend off cloud security threats.
Posted: 27 Jul 2017 | Published: 24 Jul 2017

Cisco Umbrella
 
 
COMPUTER SECURITY DEFINITION (continued): …  will be compromised by physical theft or an attack by an external hacker . Hardware protection is inherently less vulnerable to software-based attacks and authentication processes are conducted through a secure subsystem. The device also enhances the security of Web browser s, email programs and other important applications.TPM chips are available from a number of vendors, including Atmel, Broadcom, Infineon, Sinosun, STMicroelectronics and Winbond. TPM could, potentially, be used on any type of computing device. The devices are currently being installed on desktops, laptops and tablet PCs by … 
Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement