IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Multimedia (View All Report Types)
1 - 25 of 203 Matches Previous Page  |  Next Page
Privacy as a Strategic Imperative: Grow your business through trust and transparency
sponsored by IBM
WEBCAST: PH
Posted: 08 Sep 2021 | Premiered: Sep 8, 2021

TOPICS:  Security
IBM

Implementing a secure hybrid cloud using security and compliance automation
sponsored by Red Hat
WEBCAST: Making sure that your hybrid cloud environment is secure is a key goal, and automation enabling holistic DevSecOps is empowering organizations with improved compliance, monitoring, and continuous security. Watch this video to learn how Red Hat Ansible can be used to automate security operations ranging from threat hunting to remediation.
Posted: 10 Aug 2021 | Premiered: Aug 10, 2021

Red Hat

How Citrix Workspace Enables Secure Access to All the Apps Remote Workers Need
sponsored by Citrix
VIDEO: In this quick video, Calvin Hsu, VP of Product Management at Citrix, shows how Citrix Workspace can help give secure access to all the apps remote workers need. Jump in now to hear about key security platforms, capabilities, features, and more.
Posted: 10 Jun 2021 | Premiered: 10 Jun 2021

TOPICS:  Security
Citrix

How To Leverage Customized Data and Document Security Solutions In 4 Steps
sponsored by Ricoh
WEBCAST: PH
Posted: 26 May 2021 | Premiered: May 26, 2021

TOPICS:  Security
Ricoh

How to Stop Firefighting Webinar
sponsored by BROADCOM, Inc
VIDEO: Discover how you can re-evaluate your security firefighting approach and reduce risk with a comprehensive strategy built on best practices.
Posted: 04 May 2021 | Premiered: 04 May 2021

TOPICS:  Security
BROADCOM, Inc

Verticalization and Cybersecurity: The Benefits of Specializing for Security
sponsored by ConnectWise
WEBCAST: Jump into this webinar and Q&A to join Jay Ryer and David Powell from ConnectWise as they cover how industry-specific knowledge can put MSPs in different positions with their clients, as well as why cybersecurity is evolving from an IT issue to a business one.
Posted: 04 May 2021 | Premiered: May 4, 2021

TOPICS:  Security
ConnectWise

2021 Perch MSP Threat Report
sponsored by ConnectWise
WEBCAST: In this webinar, industry experts focus in on the 2021 Perch MSP Threat Report, evaluating MSP-related security events and trends. Tune in now to learn more details around why MSPs are vulnerable targets, predictions for 2021 and more.
Posted: 03 May 2021 | Premiered: May 3, 2021

TOPICS:  Security
ConnectWise

The Future of Software Delivery Needs DevSecOps
sponsored by VMware Tanzu
WEBCAST: According to Forrester research, application security is a major priority for most organizations. However, any given team’s approach to security may have some major oversights. Here, find answers for all your security questions, including who owns security in a DevOps world, where DevSecOps is implemented, and what container security must focus on.
Posted: 19 Apr 2021 | Premiered: Apr 19, 2021

TOPICS:  Security
VMware Tanzu

Secureworks: Connecting the Dots
sponsored by Dell SecureWorks
VIDEO: In this video, learn how you can use XDR to detect and respond to threats. It also explains how XDR can detect zero-day and malware-less attacks, and attackers using previously unknown tools.
Posted: 19 Mar 2021 | Premiered: 19 Mar 2021

TOPICS:  Security
Dell SecureWorks

SIG - SASE in 15 minutes
sponsored by Cisco Umbrella
WEBCAST: Secure Access Service Edge (SASE) is a cloud-delivered service that combines security and networking capabilities to provide improved performance and security for any device, location and user. Watch this webinar to learn how SASE can help your organization.
Posted: 26 Feb 2021 | Premiered: Mar 25, 2020

Cisco Umbrella

Rethinking Cyber Risk in a Re-globalized World with Andrea Little Limbago, VP Research and Analysis
sponsored by Interos
WEBCAST: The global pandemic has created seismic shifts in technology trends, particularly as they pertain to the global economy. Organizations are being driven to rethink their policies on security and risk.
Posted: 23 Feb 2021 | Premiered: Nov 5, 2020

Interos

SolarWinds and the Supply Chain, the Threat We've Ignored for Too Long
sponsored by Interos
WEBCAST: The SolarWinds attacks caught the entire country off its guard. What can security teams learn from them? Access this webcast to hear from Robert Brese, a VP and Executive Partner at Gartner, as he joins cybersecurity leaders to discuss fundamental changes that must be implemented to address the SolarWinds nation-state supply chain attacks.
Posted: 23 Feb 2021 | Premiered: Dec 22, 2020

Interos

API Security & the OWASP API Top 10
sponsored by Traceable
VIDEO: The OWASP API Top 10 project set out with a clear goal – to identify and provide insight into the most detrimental API vulnerabilities that exist across today’s organizations. Watch this episode of The API Security & the OWASP API Top 10 webinar series for a deep dive into 4 of the 10 critical API threats.
Posted: 17 Feb 2021 | Premiered: 03 Jan 2021

Traceable

API Security & the OWASP API Top 10 (BOLA/IDOR) - 1 of 4
sponsored by Traceable
WEBCAST: Bad actors have moved beyond attacking just applications – they’re attacking APIs, too. But what makes APIs prime targets? How has app security changed? Why is there a need for a new OWASP project for APIs? Access this webcast to answer these questions and to cover Broken Object Level Authentication (BOLA), the most critical API vulnerability.
Posted: 17 Feb 2021 | Premiered: May 20, 2020

Traceable

Changing the Paradigm of Security Testing
sponsored by Cymulate
WEBCAST: The threat landscape is dynamic – your security testing should be too. View this Forrester sponsored webinar to learn how a breach & attack simulation (BAS) platform can help get you there.
Posted: 11 Feb 2021 | Premiered: Feb 11, 2021

Cymulate

Bitdefender Endpoint Detection and Response (EDR)
sponsored by Bitdefender
VIDEO: Data breaches spiked in 2020 – affecting nearly every country and industry vertical. COVID-19 certainly was part of the issue – but outdated and traditional security methods also share the responsibility. Watch this short video to learn about the tools and capabilities required to meet the demands of today’s cyberthreats.
Posted: 11 Feb 2021 | Premiered: 11 Feb 2021

Bitdefender

AppSec Stats Flash Podcast EP.1 - AppSec Insights + Shared Responsibility = Secure Applications
sponsored by WhiteHat Security
VIDEO: In this episode of the AppSec Stats Flash podcast, join Setu Kulkarni, VP of Corporate Strategy and Business Development and Zach Jones, Sr. Director Security Research, as they dive into the first 3 key metrics of application security and explore the topic of shared responsibility for security. Listen here.
Posted: 10 Feb 2021 | Premiered: 10 Feb 2021

WhiteHat Security

Breaking Down Video Conferencing Privacy And Security
sponsored by Pexip
PODCAST: More people are on video than ever before, but this huge increase has also brought increased security concerns. ‘Zoombombing’ and other video conferencing breaches are in the headlines, and enterprises are being called to ensure privacy and security for all users. Jump into this podcast to hear a breakdown of the subject in detail.
Posted: 08 Feb 2021 | Premiered: May 7, 2020

Pexip

Changing the paradigm of security testing
sponsored by Cymulate
VIDEO: According to the SANS institute, half of organizations test their security controls once a year or less. At this cadence, most organizations will be ill-prepared for today’s dynamic cyberthreats. Watch this video to learn about the value of attack and breach simulation, and how to get started at your organization.
Posted: 08 Feb 2021 | Premiered: 08 Feb 2021

Cymulate

The Journey from EDR to MDR
sponsored by Bitdefender
VIDEO: Managed Detection and Response (MDR) represents the fastest growing sector of cybersecurity and it is very clear that security has now become even more important than ever before. This video provides an overview of Endpoint Detection And Response (EDR), MDR and how to know when it’s time to make the switch to MDR.
Posted: 05 Feb 2021 | Premiered: 27 Nov 2020

Bitdefender

Top Security Concerns for New Technology Deployments
sponsored by Thales
VIDEO: Thales releases an annual Data Threat Report, which compiles their research into the evolving landscape of cyberthreats, data security, and more. Watch this video for a 45-minute walkthrough of this year’s results, which include everything from zero trust, to mutlicloud environments, to quantum computing and everything in between.
Posted: 29 Jan 2021 | Premiered: 29 Jan 2021

Thales

How to Architect a Secure Remote Access Solution Without Sacrificing Performance
sponsored by ThousandEyes
WEBCAST: The COVID-19 pandemic brought on a seismic shift in the way enterprises work and where employees connect from — prompting enterprise IT to quickly scale and update VPN access to cope with increased usage. In this webinar, learn how ThousandEyes remote workforce solution enables IT teams to architect a solution without compromising on performance.
Posted: 22 Jan 2021 | Premiered: Jan 22, 2021


Security in the Fast Lane: Day 2
sponsored by WhiteHat Security
WEBCAST: When and where do you think about security? In this exclusive webinar series, join WhiteHat Security and TIBCO experts as they discuss what it means to be in the fast lane of developing and delivering modern—and secure—SaaS products. Tune in to the conversation here.
Posted: 14 Jan 2021 | Premiered: Sep 30, 2020

WhiteHat Security

Axis Security Video: Safely Delivering Simple, Secure and Managed 3rd Party Access
sponsored by Axis Security
VIDEO: VPNs, despite their long-standing rate of success in securing corporate networks, do not hold up in a remote world. In particular, offering third parties remote VPN access presents a major risk to your network. Watch this video by Axis Security to see how you can deliver secure access to third parties without their ever touching your network.
Posted: 11 Jan 2021 | Premiered: 09 Sep 2020

Axis Security

Ransomware Threat Spotlight
sponsored by Barracuda
VIDEO: Another unfortunate consequence of 2020 was the apparent rise of ransomware threats, especially those targeting remote workers. This webinar provides a look back at the top ransomware trends of 2020, highlighting key tactics, common vulnerabilities and more – watch now to get started.
Posted: 23 Dec 2020 | Premiered: 23 Dec 2020

Barracuda
1 - 25 of 203 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences