IT Management  >   Systems Operations  >  

Computer Security

RSS Feed   
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 

Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Computer Security White Papers (View All Report Types)
 
Securing Your SWIFT Environment Using Micro-Segmentation
sponsored by Illumio
WHITE PAPER: All SWIFT customers must self-attest to their compliance with the SWIFT Customer Security Program (CSP). The program is designed to respond to the wave of cybercrime targeting SWIFT installations. In this white paper, explore 3 challenges that prove especially difficult for SWIFT customers looking to achieve compliance.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

Illumio

Managed Security Service Provider (MSSP) Buyer’s Guide
sponsored by Siemplify
WHITE PAPER: This guide aims to outline the challenges faced by MSSPs and gives criteria to consider when evaluating a SOAR solution. It also provides direction regarding the implementation of SOAR in a MSSP. Read on to learn more.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Siemplify

Solving Key Security Challenges in RPA Deployments
sponsored by CyberArk Software, Inc
WHITE PAPER: Robotic process automation (RPA) has the potential to deliver huge benefits to organizations. However, IT security risks are often overlooked. In this e-book, discover tips on how to mitigate the risks RPA deployments may bring.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

CyberArk Software, Inc

5 Business Impacts of Certificate Mismanagement
sponsored by AppViewX
WHITE PAPER: In this white paper, discover a checklist that will help you evaluate if your certificate management strategy has room for improvement. You will also find 5 reasons why certificate outages can affect your business
Posted: 01 Nov 2019 | Published: 01 Nov 2019

AppViewX

Endpoint Security Buyer’s Guide: Protect, Detect, Respond
sponsored by Tanium
WHITE PAPER: Endpoints are critical to protect, as they are the most common areas for cyberattacks and breaches. This buyer’s guide is designed to help your organization evaluate endpoint security capabilities and identify gaps by focusing on the key aspects of various endpoint security tactics. Download this guide to get started.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Tanium

Top 5 Myths About SIEM
sponsored by IBM
WHITE PAPER: Traditionally, SIEM solutions were complex and targeted towards larger organizations. But with the need for security solutions ever-increasing, progressive SIEM vendors cater to businesses of all sizes.In this white paper, uncover the top 5 myths about SIEM and what organizations should expect from SIEM today. Read on to learn more.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

IBM

Securing Cloud environments: Five Data Encryption best practices to help reduce your risk
sponsored by IBM
WHITE PAPER: It is just as critical to protect sensitive cloud-based data as it is on-premises data. One way to do this is through data encryption. However, encryption is often complicated and difficult to implement and change. This paper looks at 5 best practices for securing data in multi-cloud environments using the latest data encryption technologies.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

IBM

Secure Cloud Transformation
sponsored by Menlo Security
WHITE PAPER: As a result of the increasing popularity of SaaS tools and applications, organizations are rethinking their infrastructure to include security without sacrificing user experience. In this white paper, take an in-depth look into strategic principles IT leaders are incorporating, and explore Menlo Security’s Cloud Platform.
Posted: 02 Dec 2019 | Published: 02 Dec 2019

Menlo Security

Safeguard your Private Keys with AppViewX
sponsored by AppViewX
WHITE PAPER: When a private key is uncovered by malicious actors, valuable data is compromised through the impersonation of an enterprise’s servers. So, how should enterprises properly safeguard their private keys? Learn how your enterprise can essentially replace the vulnerable private key inventories.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

AppViewX

How to Avoid Disruption by Bridging the Resilience Gap
sponsored by Tanium
WHITE PAPER: As organizations grow increasingly complex, IT security teams struggle to remain resilient as they face internal and external pressures. A recent study was conducted to better understand the barriers to resilience and the tradeoffs faced by decision-makers. Read on to uncover the key insights and conclusions.
Posted: 22 Nov 2019 | Published: 22 Nov 2019

Tanium
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement