IT Management  >   Systems Operations  >  

Computer Security

RSS Feed   
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 

Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Computer Security Multimedia (View All Report Types)
 
Top Trends in Customer Identity and Access Management (CIAM) with analyst Mary Ruddy
sponsored by Okta
WEBCAST: Customer identity has gone mainstream. A seamless customer experience across devices is now expected. At the same time, security and privacy concerns are at an all-time high. View this webinar to hear from Gartner analyst Mary Ruddy and learn about findings from her recent research "Top 5 Trends in CIAM Solution Design".
Posted: 30 Sep 2020 | Premiered: Sep 30, 2020

Okta

Webinar 7 - Is EDR sustainable? Is SIEM still significant? Introducing the Cybersecurity X-Factor
sponsored by McAfee
WEBCAST: You've heard the hype. You've probably even heard a vendor pitch or two. But what does Extended Detection & Response (XDR) really mean to the average enterprise? In this webinar, learn the facts and fiction of today's XDR landscape. Understand why some vendors will be able to deliver on the promise of XDR while others won’t.
Posted: 11 Nov 2020 | Premiered: Nov 11, 2020

McAfee

Cox Communications: The Anatomy of an Email Hack
sponsored by Cox Communications, Inc.
WEBCAST: Email security has never been under greater threat. The boom in remote employees accessing private networks has demanded more of firewalls than ever before, and as such, there are bound to be some attacks that will work their way through. Watch this webcast to understand the anatomy of a live email hack.
Posted: 06 Oct 2020 | Premiered: Oct 6, 2020

Cox Communications, Inc.

Work From Anywhere: The Mission-Critical Workforce Needs Dedicated, Portable, and Secure Connectivity
sponsored by CradlePoint
WEBCAST: One of the best ways to replicate an office network at home is by deploying a "wireless private network" or WPN – a completely separate and corporate-controlled network at home using LTE-based wireless. By doing so, IT can control the connectivity, reliability and security of the network. Watch this webcast to learn more.
Posted: 10 Nov 2020 | Premiered: Nov 10, 2020

CradlePoint

How to Successfully Secure Ecommerce
sponsored by Rackspace
WEBCAST: With more and more business transacted online, and with cyberthreats growing more and more complex, businesses need to find ways to optimize the performance of their websites without compromising security or falling short of compliance. Watch this webinar presented by Rackspace and Akamai for a guide through this challenge.
Posted: 09 Oct 2020 | Premiered: Oct 9, 2020

Rackspace

How Fortinet Secures AWS Migrations
sponsored by Rackspace
VIDEO: In order to make the most of your organization’s AWS migration, it’s critical to make deliberate considerations when it comes to establishing security measures and assigning security responsibility. Watch this webinar to more and discover how Fortinet can help secure AWS migrations and integrations.
Posted: 09 Oct 2020 | Premiered: 09 Oct 2020

Rackspace

Preparing to Implement and Maintain a Zero Trust Security Strategy - Webcast and Demonstration
sponsored by Ionic Security
WEBCAST: The implementation and maintenance of a Zero Trust strategy requires meticulous preparation in order to ensure that users, devices, applications and networks are all protected. Watch this webinar and demo, which follows the story of an organization who sought to focus their Zero Trust efforts on protecting employee PII.
Posted: 07 Oct 2020 | Premiered: Oct 7, 2020

Ionic Security

Webinar 6 – MITRE ATT&CK as a Framework for Cloud Threat Investigation
sponsored by McAfee
WEBCAST: In the continuous hunt for elusive cyberthreats, the most vulnerable assets – in this case, the cloud – must be considered. As it stands, most organizations have a low number of experts dedicated to cloud threats, and so technology must pick up the slack. Watch this webcast to learn how the MITRE ATT&CK framework can help to mitigate cloud attacks.
Posted: 11 Nov 2020 | Premiered: Nov 11, 2020

McAfee

Cisco Video Demo: Cisco Cloud Mailbox Defense
sponsored by Cisco
VIDEO: Organizations looking for a more effective security strategy against email threats need an up-close view of value. Cloud email tends to be vulnerable, and so it’s important to understand what technologies are available to defend it. View this demonstration of Cisco Cloud Mailbox Defense.
Posted: 08 Oct 2020 | Premiered: 08 Oct 2020

Cisco

How to Mitigate the Risk of Ransomware Attacks
sponsored by Keeper Security Inc
VIDEO: Ransomware is becoming one of the most pervasive and consequential threats facing organizations. In this webinar, take a closer look at the key features and capabilities of the Keeper platform, designed to mitigate the risk of ransomware attacks.
Posted: 12 Oct 2020 | Premiered: 12 Oct 2020

Keeper Security Inc
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info