IT Management  >   Systems Operations  >  

Computer Security

RSS Feed   
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 

Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Computer Security Reports
 
Umbrella - SASE in 15 minutes- English
sponsored by Cisco Umbrella
WEBCAST: Secure Access Service Edge (SASE) is a cloud-delivered service that combines security and networking capabilities to provide improved performance and security for any device, location and user. Watch this webinar to learn how SASE can help your organization.
Posted: 26 Feb 2021 | Premiered: Mar 25, 2020

Cisco Umbrella

Computer Weekly - 23 March 2021: Would the UK really nuke a cyber attacker?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, did the UK's defence and security review really suggest a nuclear response to a cyber attack? Data visualisation has been widely used to explain the Covid-19 pandemic, but not always that effectively. And jewellery retailer Pandora explains how it kept the personal touch as customers went online. Read the issue now.
Posted: 22 Mar 2021 | Published: 23 Mar 2021

ComputerWeekly.com

How to speed up Splunk searches by 15x and eliminate dark data
sponsored by Sunlightio
WHITE PAPER: Enterprises are struggling to collect, manage and draw insight from their security data in reasonable timeframes and within a reasonable cost – leaving much of the data ‘dark’ or unprocessed. Learn how you can turn dark security data into real-time insight with Splunk on Sunlight.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

TOPICS:  Security
Sunlightio

10 Essential Capabilities of aModern SOC
sponsored by Splunk
WHITE PAPER: To build a modern SOC, organizations need a security operations platform that supports 10 key capabilities. Tap into this e-book to find out what they are.
Posted: 07 Apr 2021 | Published: 07 Apr 2021

TOPICS:  Security
Splunk

It Leads The Way: How The Pandemic Empowered It
sponsored by Tanium
WHITE PAPER: Once you realize you can move all your users to WFH in days instead of years, you start to wonder what else you can do quickly. If massive changes are possible, how should IT organizations budget for 2021 and 2022? Read on to see what C-level decision-makers think on the matter.
Posted: 24 Mar 2021 | Published: 24 Mar 2021

TOPICS:  Security
Tanium

Protecting Cloud Workloads from 2021’s Top Cloud Threat
sponsored by Radware
WHITE PAPER: Get an overview of the security challenges brought about by migrating computing workloads to public cloud environments and learn how Radware addresses those challenges and assists organizations in protecting themselves.
Posted: 07 Apr 2021 | Published: 07 Apr 2021

TOPICS:  Security
Radware

Thales Data Protection for a Multi-Cloud World
sponsored by Arrow & Thales
WHITE PAPER: The biggest challenge for enterprises in the cloud is securely moving data to different clouds and keeping it as safe as it would be on-premise. Also, they must ensure interoperability among cloud environments, all while staying compliant. Download this white paper to learn about a data protection portfolio for multi-cloud architectures.
Posted: 26 Feb 2021 | Published: 31 Dec 2020


Royal Holloway: Testing antivirus efficacy in Linux
sponsored by ComputerWeekly.com
EZINE: Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

ComputerWeekly.com

How Small Businesses Overcome Email And Security Challenges
sponsored by Mimecast
ANALYST REPORT: Like larger firms and enterprises, smaller organizations face enormous problems in managing email and web security threats. Access this Osterman Research white paper to learn how smaller organizations can address these problems by integrating their email and web security capabilities using the cloud as the delivery model.
Posted: 10 Mar 2021 | Published: 10 Mar 2021

Mimecast

Hitachi ID Bravura Discover
sponsored by Hitachi ID
DATA SHEET: Learn how Hitachi ID Bravura Discover delivers a powerful risk and threat assessment for both IAM and PAM solutions to help get your organization on the right track.
Posted: 12 Mar 2021 | Published: 12 Mar 2021

TOPICS:  Security
Hitachi ID
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences