IT Management  >   Systems Operations  >  

Computer Security

RSS Feed   
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 

Computer Security definition sponsored by, powered by an online computer dictionary
Computer Security Reports
Mobile Access Optimization and Security for the Cloud Era
sponsored by Cato Networks
EBOOK: Mobile and the cloud are the new normal for today's business. But traditional access solutions are poor choices when mobile users "live" in AWS, Office 365, and the rest of the cloud. This whitepaper will explain the pros and cons of the three ways mobile users can securely access the cloud: direct access, legacy VPN, and cloud SD-WAN.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

Cato Networks

Hyperautomated AI-based Security vs VMware NSX
sponsored by ShieldX
DATA SHEET: In this sheet, discover how to secure the modern, multi-cloud data center with hyperautomated AI-based security and compare it to a different network security offering in the market.
Posted: 16 Mar 2020 | Published: 16 Mar 2020


Co-operative Group’s Identity Infrastructure Governs Data, Applications & Users
sponsored by SailPoint Technologies
CASE STUDY: In this case study, learn how the Co-operative Group was able to improve their security posture by building their first identity governance program with SailPoint.
Posted: 13 Mar 2020 | Published: 13 Mar 2020

SailPoint Technologies

The Enterprise Encryption Blueprint
sponsored by Thales
WHITE PAPER: Download this white paper to be set in the right direction to discover, define and deploy the enterprise data encryption strategy that is best for your organization.
Posted: 23 Mar 2020 | Published: 23 Mar 2020


Protection Inside and Outside the Office: The New State of Cybersecurity
sponsored by Cisco Umbrella
RESOURCE: More and more employees are working outside of the central office — and often outside its protection. To secure these remote workers and locations requires a fundamentally different approach. Learn more about the new state of cybersecurity in this infographic.
Posted: 11 Mar 2020 | Published: 11 Mar 2020

Cisco Umbrella

What You Need to Know to Combat the Insider Threat
sponsored by Dell SecureWorks
WHITE PAPER: In this white paper, you will learn to better understand the potential damage an insider threat can cause an organization and appropriate identification techniques to help you mitigate the risk they pose to an organization.
Posted: 11 Mar 2020 | Published: 11 Mar 2020

Dell SecureWorks

The Changing Face of Data Security 2020 Thales Data Threat Report
sponsored by Thales
ANALYST REPORT: No organization is immune from data security threats, with 49% of global respondents experiencing a data breach at some point. In this 2020 Thales Data Threat Report, learn why it’s important to implement a smarter approach to data security and review IDC’s research on the topic.
Posted: 24 Mar 2020 | Published: 24 Mar 2020


GlobalSign Product Demo
sponsored by GlobalSign
WEBCAST: View this product demo from GlobalSign for a walk through of their managed SSL portal that issues SSL and TLS certificates to enterprises.
Posted: 18 Mar 2020 | Premiered: Mar 18, 2020


Integrating Static Application Security Tools (SAST) In DevSecOps
sponsored by Valbrio
WHITE PAPER: Learn how the role of static application security testing tools (SAST) and GrammaTech CodeSonar can be used in DevSecOps and continuous development pipelines to improve quality and security and ultimately, make teams more competitive in getting market leading solutions out the door quicker.
Posted: 13 Mar 2020 | Published: 13 Mar 2020


5 Things You Can't Do with EDR
sponsored by Trend Micro
RESOURCE: View this infographic for 5 things you can’t do with EDR and how Trend Micro XDR responds to attacks.
Posted: 11 Mar 2020 | Published: 11 Mar 2020

Trend Micro

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info