IT Management  >   Systems Operations  >  

Computer Security

RSS Feed   
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 

Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Computer Security Reports
 
Overcome the challenges of protecting data that is here, there and everywhere
sponsored by IBM
EBOOK: When it comes to cloud environments, whether in the public cloud or a privately hosted or hybrid environment, data security and protection controls must protect sensitive data. Read this e-book to learn how data security and protection technologies should operate in multiple environments (physical, cloud and hybrid) at the same time.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

IBM

State of the Firewall
sponsored by FireMon
WHITE PAPER: While firewalls are a critical part of a holistic security approach, enterprises remain challenged by the lack of automation, network security complexity, and lack of overall network visibility. Recently, FireMon conducted research into how organizations are managing security challenges. Read on to uncover the key themes and findings.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

FireMon

Video Surveillance System (VSS) Architecture in a Smart Building
sponsored by Forescout
RESOURCE: Today, many buildings have a hybrid VSS architecture that is quite complex, containing a variety of legacy and new systems, including both analog and IP cameras. The problem is that this architecture presents many vulnerabilities. In this infographic, explore some common vulnerabilities found in many VSS commonly used in large organizations.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Forescout

Managed Security Service Provider (MSSP) Buyer’s Guide
sponsored by Siemplify
WHITE PAPER: This guide aims to outline the challenges faced by MSSPs and gives criteria to consider when evaluating a SOAR solution. It also provides direction regarding the implementation of SOAR in a MSSP. Read on to learn more.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Siemplify

Network Security Made Simple
sponsored by Cisco Umbrella
EBOOK: The volume and sophistication of attacks are intensifying relentlessly — and it’s clear that conventional defenses are not enough. In this e-book, discover challenges facing today’s security professionals and explore some simple actions you can take to reduce malware, simplify security and improve network performance.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Cisco Umbrella

Protecting Data Capital in Your Organization
sponsored by Dell EMC
WHITE PAPER: With high volumes of business-critical data comes the necessity for innovative and modernized data protection strategies—read this white paper to learn how to keep your most valuable digital assets well protected and compliant.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Dell EMC

Learnings from The Frontlines: 4 Steps to Protect What Attackers Are Really After
sponsored by Cyber-Ark Software
WHITE PAPER: Forrester estimates that 80% of security breaches involve privileged credentials & it makes sense why: attackers are targeting those who have access to sensitive data & infrastructure. In this guide, discover how to think like an attacker in order to develop a security strategy to protect your critical assets.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

Cyber-Ark Software

Future-Proofing Your Information Security Strategy
sponsored by InteliSecure
WHITE PAPER: In this guide, Jeremy Wittkop, Chief Technology Officer, explains why security leaders should start pivoting their security strategies to emphasize the 2 elements of security that are not likely to be diminished: people and data. Read on to learn more about what he thinks really matters in the future of security and what you can do about it now.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

InteliSecure

Advanced Data Protection for Midsize Enterprises
sponsored by InteliSecure
WHITE PAPER: Advanced data protection is no longer a choice for midsize organizations. Large enterprises have the resources to detect a breach & recover from an occurrence, while midsize enterprises typically can't afford a similar incident. But there is a silver lining: security systems are more capable and affordable than ever before.
Posted: 30 Oct 2019 | Published: 30 Oct 2019

InteliSecure

Transforming Cybersecurity Strategy for the Age of IoT
sponsored by Forescout
WHITE PAPER: In a recent study, the Forescout Research Team looks to better understand the current risks and threats by looking at the IoT in a smart building. The report outlines 3 strategies an attacker might use and discusses ways to mitigate them. Read on to dive deeper into the key findings.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Forescout
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement