IT Management  >   Systems Operations  >  

Computer Security

RSS Feed   
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 

Computer Security definition sponsored by, powered by an online computer dictionary
Computer Security Reports
The Proven Path to Take Command of Risk
sponsored by RSA
VIDEO: Some risk management processes today include, outdated reporting, information silos, and limited risk visibility, etc. which can actually lead to more risk in the business. That's why many organizations could benefit from switching to an integrated risk management strategy. Download this video to learn more.
Posted: 19 Mar 2019 | Premiered: 19 Mar 2019


Data Immutability - A Key Issue for Capital Markets' RegTech
sponsored by BT
WHITE PAPER: Staying compliant involves not only accurate reporting, but also secure and immutable storage of data. In this white paper, learn how to demonstrate immutability is in action in your front, middle and back office setups.
Posted: 22 Mar 2019 | Published: 31 Mar 2019


Privacy and Data Protection Podcast
sponsored by Micro Focus & PwC
PODCAST: There is a lot more data at risk today than there has been in the past. This explosion of personal data being collected, harnessed and used means that companies have to be increasingly aware of how they manage it. In this podcast, learn about challenges in privacy and data protection and how PwC meets these challenges head on.
Posted: 12 Mar 2019 | Premiered: Mar 7, 2019

Micro Focus & PwC

Definitive Guide to Office 365 Data Protection
sponsored by McAfee, Inc.
WHITE PAPER: In this eBook, discover the state of Office 365 adoption, some of the most common data loss scenarios in Office 365, threats to data and users in Office 365, with real world examples, and more.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

McAfee, Inc.

HP Managed Print Services: Topics of influence
sponsored by HP
WHITE PAPER: Your organization is continuously creating confidential data that's crucial to operations. And you're probably using multiple security methods to protect this data. But is your printing environment as secure as the rest of your infrastructure? In this white paper, learn how HP strengthens security throughout your printing environment.
Posted: 12 Mar 2019 | Published: 30 Jun 2018


Are You Sending Data to Your Printers Securely? Find Out How.
sponsored by HP
RESOURCE: Any data that is sent between devices is vulnerable to an attack. Unsecured printers expose your business to the same data threats as your PCs. In this resource, find a checklist developed by The Center for Internet Security to help your organization better protect your printing environment.
Posted: 14 Mar 2019 | Published: 14 Mar 2019


Technology's Role in Data Protection - The Missing Link in GDPR Transformation
sponsored by Micro Focus & PwC
WHITE PAPER: The EU GDPR delivers a fundamental change in how data controllers and data processors handle personal data. In this white paper, evaluate your organization's GDPR efforts using PwC's framework for evaluating GDPR technology.
Posted: 11 Mar 2019 | Published: 31 Oct 2017

Micro Focus & PwC

Customer Experience: The Flip Side of the Fraud Detection Coin
sponsored by SAS
WHITE PAPER: In this white paper, explore how a new approach to deposit risk monitoring and risk assessment can help banks turn diverse customer data into real-time fraud and risk insights, and explore how a SAS fraud solution for deposit monitoring can help your financial organization achieve a better balance between customer service and security.
Posted: 14 Mar 2019 | Published: 31 Dec 2017


2018-2019 Global Application & Network Security Report
sponsored by Radware
RESEARCH CONTENT: This 2018-2019 global application & network security report highlights the major themes shaping cybersecurity of late. Explore the report to help your organization keep its finger on the pulse of the rapidly evolving and increasingly dangerous cybersecurity landscape.
Posted: 12 Mar 2019 | Published: 12 Mar 2019


Case Study Global Airline
sponsored by AppGuard
CASE STUDY: This major global airline needed to enhance their security measures, as a cyberattack could jeopardize passenger lives, harm reputation and revenue. Download this case study to find out how they saw success with AppGuard's endpoint protection tools.
Posted: 19 Mar 2019 | Published: 19 Mar 2019


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement