IT Management  >   Systems Operations  >  

Computer Security

RSS Feed   
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 

Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Computer Security Reports
 
CipherTrust Data Discovery and Classification from Thales
sponsored by Thales
VIDEO: To meet today’s regulatory, privacy and security needs requires greater visibility into and understanding of key risk areas. This 5-minute video provides a brief overview of the key features and capabilities of Thales’ CipherTrust Data Discover and Classification, a dashboard designed to help organizations address these challenges.
Posted: 10 Aug 2020 | Premiered: 23 Mar 2020

Thales

Data Protection for Kubernetes on VMware
sponsored by Dell Technologies
WHITE PAPER: Containers were originally developed as a method to package, deploy and isolate applications from each other to improve density. But as cloud native applications have matured, so too has the orchestration capabilities of containers. Download this white paper to learn more about data protection for containerized apps.
Posted: 06 Aug 2020 | Published: 06 Aug 2020

Dell Technologies

Security at the Speed of 5G
sponsored by AT&T Cybersecurity
WHITE PAPER: Download this report to learn the current posture and plans of the cybersecurity industry as they relate to the impact of 5G; and you'll be able to explore how your organization's plans account for the gaps and recommendations we've identified.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

AT&T Cybersecurity

SailPoint Predictive Identity™: AI-driven Identity for Today’s Modern Enterprise
sponsored by SailPoint Technologies
TECHNICAL ARTICLE: The benefits of a digital transformation can create access complications, which can often lead to potential security risks. In this technology brief, discover how SailPoint harnesses the power of AI and machine learning in their Predictive Identity platform to help organizations ensure security, compliance and access management.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

SailPoint Technologies

Enhancing the Modern Workplace with Hardware-Enforced Security
sponsored by Servium
WHITE PAPER: An exceptional user experience, no matter where work gets done is fundamental to the modern workplace. However, balancing this pursuit and the freedoms it entails with robust security is tough for IT teams. In this white paper, learn why a different approach to security is needed to support the modern workplace.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

Servium

Video: Understanding bots and their role in credential stuffing
sponsored by Akamai Technologies
RESOURCE: In this talk, Akamai security strategist Siddharth Deshpande will walk you through the dark web economy for malicious bots used in Credential Stuffing attacks and discuss options for effective Bot Management.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

Akamai Technologies

Privileged Access Management Policy Template
sponsored by Thycotic
WHITE PAPER: In order to protect privileged accounts against misuse, organizations are establishing privileged access management (PAM) policies. The following guide highlights a 10-step process for customizing a PAM policy template, designed to help your team build a policy based around your unique security and compliance requirements.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Thycotic

Privileged Access Management
sponsored by CyberArk Software, Inc
WHITE PAPER: Privileged access management (PAM) is becoming increasingly popular for enhancing organizational risk management and cybersecurity strategies. The following report provides an in-depth look into PAM offerings, vendors and market segments to help buyers get started on their journey. Read on for an in-depth look into the PAM landscape.
Posted: 04 Aug 2020 | Published: 07 May 2020

CyberArk Software, Inc

Computer Weekly – 4 August 2020: The UK's $500m space technology gamble
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.
Posted: 03 Aug 2020 | Published: 04 Aug 2020

ComputerWeekly.com

EDR: The Case for Automation and Simplification
sponsored by Kaspersky Lab
WHITE PAPER: Endpoint security is enhanced through increased visibility, but the ability to investigate threats and search for specific indicators of compromise can give endpoints an added layer of protection. Add in automated threat response, and your endpoint security is real-world ready. Read this white paper on endpoint detection and response to learn more.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

Kaspersky Lab
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info