IT Management  >   Systems Operations  >  

Computer Security

RSS Feed   
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 

Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Computer Security Reports
 
Wire Transfer Guard: Harnessing Distribution Deception to Prevent Cyber Fraud
sponsored by Illusive Networks
CASE STUDY: This resource highlights how early network visibility and insight allows defenders to secure the time they need to analyze the adversary and take appropriate action when protecting financial transfers.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

Illusive Networks

Next-generation Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: 49% of security professionals say their network is at least somewhat vulnerable to security threats and eliminating vulnerabilities is a continuous battle. This white paper explores the processes of the vulnerability management lifecycle, reviews current areas of deficiency and introduces next-generation vulnerability management.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Skybox Security

Visibility, Detection and Control for Industrial Networks
sponsored by SecurityMatters
RESOURCE: This resource reveals how to improve network security with strategies such as visibility, threat detection capabilities and control.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

SecurityMatters

Holistic Endpoint Security
sponsored by Cylance
RESOURCE: According to Forrester, as cyber threats are increasing in number and complexity, traditional approaches to endpoint security have become outdated and less effective. This Forrester study offers a market overview of endpoint security and provides key trends within the industry as well as examples of strategies organizations are taking.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

Cylance

Reducing Cybersecurity Costs & Risk through Automation Technologies
sponsored by Juniper Networks
ANALYST REPORT: In this 32-page Ponemon Institute report, learn how organizations are deploying security technologies that augment or replace human intervention, along with the benefits of automation and their cost effectiveness.
Posted: 12 Feb 2018 | Published: 30 Nov 2017

Juniper Networks

Cloud Service Provider Reduces Impact of Global Denial-of-Service Attacks by Over 90 Percent
sponsored by Juniper Networks
CASE STUDY: In this case study learn how i3D.net, a managed hosting provider based in the Netherlands, reduced the impact of global DoS attacks by over 90% and reduced the amount of trouble tickets lowering service costs.
Posted: 12 Feb 2018 | Published: 31 Dec 2017

Juniper Networks

The CSO Broad-Level Reporting Survival Guide
sponsored by BitSight
WHITE PAPER: This 16-page survival guide dives into advancing the CSO/CISO-board relationship and why the board needs security leaders to fuel disciplined growth. Uncover what the board wants, how to present to the board, and tips to communicate with the board.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

BitSight

User Behavior Analysis & SIEM
sponsored by LogRhythm, Inc.
EGUIDE: In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis.
Posted: 15 Feb 2018 | Published: 07 Feb 2018

LogRhythm, Inc.

Solve Migration, Security, and Productivity Challenges Around Office 365
sponsored by Citrix
VIDEO: Organizations around the world are embracing Office 365 as their tool of choice for productivity applications. However, it is critical to have a strong plan in place to ensure a seamless migration. This webinar discusses challenges that typically arise during an Office 365 migration and how to deal with them.
Posted: 02 Feb 2018 | Premiered: 02 Feb 2018

Citrix

Software-defined Secure Networks
sponsored by Juniper Networks
WHITE PAPER: According to this ESG study, 28% of organizations claim to have a shortage with network security specialists. This research report delves into how organizations can monitor their networks to detect suspicious activities and effectively enforce policies to prevent malicious behavior with the help of software-defined networks.
Posted: 12 Feb 2018 | Published: 31 Dec 2017

Juniper Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement