IT Management  >   Systems Operations  >  

Computer Security

RSS Feed   
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 

Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Computer Security Reports
 
Cover Your Bases: Best Practices for Protecting Remote Work
sponsored by Okta
EBOOK: You have a network to protect, and this means not compromising when it comes to access management, authentication, onboarding and training. In a remote world, you need contextualized, cloud-first identity control that’s flexible, so you can handle all this and more, no problem. Download this Okta best practice guide for details.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Okta

Your Path To Zero Trust
sponsored by Forcepoint
EBOOK: Data security in the remote work age can be complex. The Zero Trust risk validation system makes it easy. With a mantra of "Never Trust, Always Verify," Zero Trust is playing a key role in enabling organizations to support remote working for the long term. Download this e-book to learn more.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Forcepoint

Palo Alto Networks Video: Learn How SASE Can Help Enable a Secure Remote Workforce
sponsored by Palo Alto Networks
WEBCAST: Businesses worldwide are now remote, and so networking and security professionals now face the challenge of securely scaling access for their mobile workforces. SASE can help address this challenge by convergeing networking and network security capabilities into a single cloud-delivered service. Listen to this panel of experts to learn more.
Posted: 11 Jan 2021 | Premiered: Jan 11, 2021

Palo Alto Networks

The Practical Executive'S Guide To Data Loss Prevention
sponsored by Forcepoint
WHITE PAPER: Download the whitepaper for information on successfully deploying DLP, including latest data breach trends, assessing DLP vendors, 9-step framework, and best practices to ensure success.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

TOPICS:  Security
Forcepoint

Zero-Trust Network Access
sponsored by NetMotion
WHITE PAPER: If you’re part of the 98% of organizations using a mix of on-prem and cloud applications, chances you still want to keep your VPN, but you’re exploring more flexible network access options as well. Leverage this white paper to explore NetMotion’s Zero-Trust Network Access, which allows you to run zero trust while retaining your VPN.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

NetMotion

Enable and Educate Your Team
sponsored by WhiteHat Security
WHITE PAPER: The reality for many companies is that they’re only at risk for breaches from common, easily-preventable attacks because their teams didn’t get the right security training. Check out the WhiteHat Security eLearning Platform program here to see if it’s the right fit for your teams.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

WhiteHat Security

Introducing NetMotion SDP
sponsored by NetMotion
RESOURCE: Security teams need uncompromised visibility across all devices, no matter where they are or what network they’re on. In this vein, they also need to prevent unwanted lateral movement across networks by granting access only to necessary applications. Engage this interactive product page where you can absorb the ins and outs of NetMotion SDP.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

NetMotion

Best Practices for E-Commerce and Retail Fraud Management
sponsored by Pipl
ANALYST REPORT: E-commerce and retail fraud management forces security and risk pros to balance the business need for frictionless customer experiences with fraud avoidance. Inside this Forrester report, discover guidance on how to maintain this precarious balance.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Pipl

The Fidelis Threat Intelligence Toolkit is Here
sponsored by Fidelis
RESOURCE: Organizations are struggling to keep up with threat actors as they engage different vectors and develop their toolkit of attacks. It seems only fair, then, that you have a toolkit of your own. Click here to access your Fidelis Threat Intelligence Toolkit. Leverage the latest cybersecurity news and know what’s on the prowl and how to defend.
Posted: 21 Jan 2021 | Published: 21 Jan 2021

Fidelis

RiskTech 100 2021 Research Report
sponsored by MetricStream
RESEARCH CONTENT: Changes in the risk and compliance landscape were accelerated last year, likely due to the spread of COVID-19 – So what will the technology trends, security threat types and emerging offerings in this landscape look like in 2021? Read this exclusive RiskTech 100 research report to find out.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

MetricStream
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info