IT Management  >   Systems Operations  >  

Computer Security

RSS Feed   
DEFINITION: A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.TPM minimizes the risk that data on the computer  … 

Computer Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Computer Security Reports
 
State of the Channel Ransomware Report: Canadian Edition
sponsored by Datto, Inc.
EBOOK: More than 200 Canadian MSPs share their ransomware hardships and triumphs, with specifics on how ransomware is targeting customers—in particular, SMBs—and recommendations for recovery and business continuity. Read on for a unique look into the state of ransomware.
Posted: 07 Dec 2018 | Published: 31 Dec 2017

Datto, Inc.

Digital Risk Protection: Understanding Digital Risk
sponsored by Proofpoint, Inc.
RESOURCE: Understand how you can protect your brand and customers from social media, mobile app, and domain threats.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

Proofpoint, Inc.

Analytics-drive Security: The Next Frontier for CSOs
sponsored by Splunk
RESOURCE: In this resource, learn about an analytics-driven security technology that is designed to connect the dots faster to help predict patters, identify suspicious behavior, and automate corrective actions
Posted: 20 Nov 2018 | Published: 20 Nov 2018

Splunk

Protecting your Execs and Offices: Executive and Location Threat Monitoring
sponsored by Proofpoint, Inc.
EBOOK: Now more than ever, it is crucial to safeguard your executives and office locations from unhappy customers, activist groups, cybercriminals and even disgruntled employees. Why? Download this e-book to learn about the significant risks these groups pose to your organization.
Posted: 30 Nov 2018 | Published: 30 Nov 2018

Proofpoint, Inc.

6 Steps For Building a Robust Incident Response Function
sponsored by IBM Resilient
WHITE PAPER: Organizations globally realize that working only to prevent and detect cyberattacks will not protect them against cyber security threats. Download this white paper to learn about IBM Resilient, and review the 6 steps to developing sophisticated and robust incident response functions.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

IBM Resilient

Magic Quadrant for Security Awareness Computer-Based Training
sponsored by MediaPRO
WHITE PAPER: End-user-focused security education and training is a rapidly growing market that has experienced a nearly 40% growth from 2016 through 2017. As products within this market mature, each vendor seeks to differentiate its products and services in a variety of ways. This white paper compares the strengths and cautions of many important vendors.
Posted: 05 Dec 2018 | Published: 13 Nov 2018

MediaPRO

Security Automation Quick Wins
sponsored by Siemplify
VIDEO: The state of security operations has led to teams embracing automation to combat alert overload and make the most of their security tools. However, many companies don't know where to start. This webcast details which processes are ripe for automation and gives practical examples for automating security operations processes.
Posted: 07 Dec 2018 | Premiered: 05 Dec 2018

Siemplify

Make Your Breakthrough in Governance and Compliance
sponsored by Bizagi Ltd
RESOURCE: In this report, explore the benefits of digitizing compliance, how other companies have had success doing so, how to tackle your compliance challenges, and more.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

Bizagi Ltd

The Values of Both Building Your Own SOC and Buying SOC-as-a-Service
sponsored by Arctic Wolf
VIDEO: SOCs are the latest services you can now outsource rather than build in-house. The question is whether a DIY SOC or a SOC-as-a-Service is a better fit for your company. In this webcast, learn the value propositions of both SOC-as-a-Service and DIY SOC. The speakers also discuss key factors to help you decide which option is best for you.
Posted: 06 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

Managed Print Services Solutions & support services
sponsored by Xeretec
BROCHURE: A Managed Print Service (MPS) offers businesses a quick and simple way to reduce costs and improve productivity. But with so many solutions on the market, how do you ensure that your MPS will overcome the unique needs of your organization? Download this brochure to explore the benefits of a personalized MPS.
Posted: 06 Dec 2018 | Published: 31 Dec 2017

Xeretec
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement