IT Management  >   Systems Operations  >  

Computer Security

RSS Feed   
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 

Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Computer Security Reports
 
PSD2 State of the Nation, July 2019
sponsored by LexisNexis Risk Solutions
WEBCAST: In this webinar, learn about the impending PSD2 deadline on September 14th, 2019. Also discover how LexisNexis Risk Solutions can support your organization with a range of strong authentication methods.
Posted: 05 Sep 2019 | Premiered: Sep 5, 2019

LexisNexis Risk Solutions

Building a Customer-Obsessed IAM Team
sponsored by Akamai Technologies
ANALYST REPORT: Download this Forrester Report for an overview of the skills and job descriptions required to manage CIAM effectively. This report also details hiring best practices and the typical organizational ownership of CIAM and how it plays with other technology management and business teams.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

Akamai Technologies

Gigamon Industry Brief: Enterprise
sponsored by Gigamon
PRODUCT OVERVIEW: Network performance and security are vital elements of any business. With the added complexity of distributed network architectures, full visibility is necessary to ensure continued high performance and security. In this brief, learn how Gigamon Visibility Platform can help balance the needs for network efficiency and security.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

Gigamon

Manage your End-of-Life IT Assets Securely and Responsibly
sponsored by Iron Mountain
DATA SHEET: As organizations migrate to new technologies to innovate, drive efficiencies and enable new ways of working, they can't simply throw their old IT and office equipment in the bin. Security must stay top of mind. Download this brief to learn about Iron Mountain's Secure IT Asset Disposition Service.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Iron Mountain

Risk-Based Vulnerability Orchestration Across the Software Lifecycle
sponsored by ZeroNorth
EBOOK: This e-book explains the difference between automation and orchestration, why this matters and cost-effective steps you can take to begin mitigating risk. Read on to learn more.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

ZeroNorth

How Do You Cultivate Compliance to Protect Your Business?
sponsored by Concur Technologies
WHITE PAPER: Regardless of your organization's industry, size, or location, travel and expense spend mistakes or fraud can have significant financial consequences. In this white paper, uncover 6 ways to get control over compliance, effectively manage travel and expense spend, and cultivate a culture of compliance.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

Concur Technologies

EMEA Cybercrime Report 2019 - Key Findings
sponsored by LexisNexis Risk Solutions
WEBCAST: In this webinar, Courtney Austin and Ellie Burns from LexisNexis Risk Solutions discuss key findings from the 2019 EMEA Cybercrime Report. Download the webinar to find out what is fueling cybercrime in the EMEA region.
Posted: 05 Sep 2019 | Premiered: Jul 31, 2019

LexisNexis Risk Solutions

Efficient Efficacy with Morphisec Unified Threat Prevention Platform
sponsored by Morphisec, Inc.
ANALYST REPORT: This ESG Technical Validation documents evaluation of Morphisec's moving target defense-powered Unified Threat Prevention Platform. Read on for a look at the operational simplicity of the platform and the efficacy of its threat prevention capabilities.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Morphisec, Inc.

How a Global Pharmaceutical Leader Boosted Security and Efficiency
sponsored by Cisco Umbrella
CASE STUDY: As Lundbeck, a global pharmaceutical leader expanded, so too did the need to manage its Cisco Cloud Web Security (CWS) solution. Download this case study to see how Lundbeck saw success with Cisco Umbrella.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

Cisco Umbrella

CenturyLink 2019 Threat Report
sponsored by CenturyLink
ANALYST REPORT: Organizations will continue to accelerate the deployment of new technologies and capabilities that drive network traffic and security complexity. In the CenturyLink 2019 Threat Report, explore the role of deep network-based threat intelligence and discover the latest risks and attacks including botnets, DNS attacks, and more.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

CenturyLink
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement