IT Management  >   Systems Operations  >  

Computer Security

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 
Definition continues below.
Computer Security Reports
 
Recognize Your Security Shortcomings and Address Them with Confidence
sponsored by Dell, Inc.
EGUIDE: This e-guide highlights the current state of data security among businesses of all sizes. Learn about the concerns adopting a cloud-based infrastructure raises and how to confidently secure your IT environment overall.
Posted: 13 Jun 2016 | Published: 21 Mar 2016

Dell, Inc.

State of Trust Gap in 2015
sponsored by MobileIron
RESOURCE: Discover important expectations and viewpoints employees have about their enterprise's privacy policies on personal data located on mobile devices. Uncover statistics and global highlights derived from the Trust Gap Survey data.
Posted: 17 Jun 2016 | Published: 31 Dec 2015

MobileIron

Modern Adaptive Security
sponsored by Illumio
WHITE PAPER: Discover how the need for more segmentation, protecting high-value assets, and meeting stricter compliance rules will shift how security budgets are allocated in the near-future.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Illumio

Redefining the Mission of Mobile Authentication
sponsored by Aruba Networks
WHITE PAPER: Billions of Wi-Fi enabled smartphones and tablets are pouring into the workplace and users have more latitude to connect to any network and download apps of their choice. The expectation is that the mobility experience just works anytime, anywhere. This is causing IT to struggle to maintain control.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Aruba Networks

Hackers Aren't As Picky As You Think
sponsored by Verizon
VIDEO: Discover the first truth of network security: Malicious actors are mostly out for low-hanging fruit. With the resource found in this video, you can begin developing your plan to prevent hackers from exploiting weaknesses in your network.
Posted: 24 Jun 2016 | Premiered: 28 Apr 2016

Verizon

SANS: What are their Vulnerabilities? A Survey on Continuous Monitoring
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Continuous monitoring is among the latest approaches to keep your company safe from hackers, but most monitoring systems fall short of what it takes to keep hackers out. Read this SANS survey report to find out why.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Hewlett Packard Enterprise

IT Security Threats Facing Retail in 2016
sponsored by Verizon
RESEARCH CONTENT: This report reveals the 3 top IT security threats facing retail businesses in 2016. You'll see how you're vulnerable and what steps to take to begin improving your security strategy.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Verizon

Value of QRadar QFlow and VFlow Collector Technology for Security Intelligence
sponsored by IBM
WHITE PAPER: With the growing amount of threats in today’s IT landscape, businesses have bolstered their network security with greater visibility methods. This guide explores the importance of network data when it comes to protecting your IT system.
Posted: 15 Jun 2016 | Published: 31 Jan 2013

IBM

How to Reduce Cost While Securing your Operations
sponsored by Verizon
WHITE PAPER: See how a media company came to have a network that was more secure than ever, while lowering their overall costs. It's desirable but difficult to have a fast, reliable, and secure network infrastructure – but it can be done.
Posted: 09 Jun 2016 | Published: 31 Dec 2015

Verizon

Office 365: Cloud Data Security Considerations, Benefits to Explore Before Adopting
sponsored by Proofpoint, Inc.
EGUIDE: IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Proofpoint, Inc.
 
 
COMPUTER SECURITY DEFINITION (continued): …  will be compromised by physical theft or an attack by an external hacker . Hardware protection is inherently less vulnerable to software-based attacks and authentication processes are conducted through a secure subsystem. The device also enhances the security of Web browser s, email programs and other important applications.TPM chips are available from a number of vendors, including Atmel, Broadcom, Infineon, Sinosun, STMicroelectronics and Winbond. TPM could, potentially, be used on any type of computing device. The devices are currently being installed on desktops, laptops and tablet PCs by … 
Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement