IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Multimedia (View All Report Types)
1 - 25 of 219 Matches Previous Page  |  Next Page
QualiFYI
sponsored by QualiSystems
VIDEO: There’s a massive demand for cyber experts to secure networks with efficiency and confidence. With cyber ranges, testing the defenses is easier and more trustworthy. In this brief interview, Quali discusses how cyber range training is a crucial endeavor that organizations must take on. Click inside the hear why.
Posted: 17 Jan 2020 | Premiered: 17 Jan 2020

QualiSystems

Why DevOps Has Not Become DevSecOps…Yet
sponsored by WhiteHat Security
WEBCAST: DevSecOps is facing a crisis known to most new technologies: what are the expectations of the technology, and what are the realities? In this webinar, WhiteHat debunks popular DevSecOps myths to understand the actual state of security automation today. Watch the webinar here.
Posted: 13 Jan 2020 | Premiered: Jan 13, 2020

WhiteHat Security

Using AppSec Statistics to Drive Better Outcomes
sponsored by WhiteHat Security
WEBCAST: Organizations that invest in DevSecOps see reduced risk, lower costs, and a better time-to-market. Looking for the stats? In this webinar, WhiteHat delivers the application security “state of the union,” breaking down the latest security statistics. Catch up and listen now.
Posted: 13 Jan 2020 | Premiered: Jan 13, 2020

WhiteHat Security

DevSecOps Framework
sponsored by WhiteHat Security
WEBCAST: DevSecOps involves many different team members, all with different responsibilities, priorities, and end goals. Thankfully, security automation enables collaboration. Watch this webinar to see how DevSecOps can influence better teamwork – and security practices.
Posted: 10 Jan 2020 | Premiered: Jan 10, 2020

TOPICS:  Security
WhiteHat Security

Secure Coding Practices: Use Software Composition Analysis
sponsored by WhiteHat Security
WEBCAST: Software composition analysis (SCA) is now a necessary process in application development. Why? Because only 10% of code is written end-to-end by an organization’s developers. Let’s say that another way: applications are built with 90% borrowed code. Watch this webinar to understand and compare your security options.
Posted: 09 Jan 2020 | Premiered: Jan 9, 2020

TOPICS:  Security | Software
WhiteHat Security

Increasing Speed and Risk: How to Secure Third-Party Software Code
sponsored by WhiteHat Security
WEBCAST: When DevOps came to the IT scene, organizations rushed toward adoption. Now, we’re realizing that in that rush, IT overlooked some crucial security measures. In this webinar, Forrester and WhiteHat experts explore how to hit the brakes and assess your DevOps security strategy. Watch the webinar here.
Posted: 09 Jan 2020 | Premiered: Jan 9, 2020

TOPICS:  Security
WhiteHat Security

Zero Trust Access
sponsored by PortSys
WEBCAST: Cyberattacks are becoming increasingly damaging, and the strategies in place are ineffective at mitigating these breaches. Join the CEO of PortSys in this webinar as he discusses why today’s security tactics fall short and how the zero-trust approach can help to better defend data.
Posted: 03 Jan 2020 | Premiered: Jan 3, 2020

PortSys

Software Composition Analysis: An examination of critical SCA concepts
sponsored by Sonatype
WEBCAST: Based on Sonatype’s data, around 313,000 java components are downloaded each year. Of those downloads, 27,704 are components with known vulnerabilities – that’s 8.8%. With software composition analysis (SCA), security integrates seamlessly with open source innovation. Check out Sonatype’s webinar to find out how.
Posted: 23 Dec 2019 | Premiered: Aug 30, 2019

TOPICS:  Java | Security
Sonatype

DevSecOps Reference Architecture Test Drive Webinar
sponsored by Sonatype
WEBCAST: What happens when an organization integrates the team, technique, and toolsets of a Security team with a DevOps team, where trust is a major component? Access this webinar, to hear the creator of DevSecOps as he talks with 3 industry experts across several organizations, sharing their battle-hardened stories about creating safer software sooner.
Posted: 23 Dec 2019 | Premiered: Dec 23, 2019

Sonatype

Introducing Frictionless Content Security
sponsored by Box
VIDEO: The paradox of security is the more you lock down content, the harder you make it for users to get their work done. In this video, learn how Box Shield can help reduce the risk of accidental data leakage and protect your business from insider and external threats.
Posted: 23 Dec 2019 | Premiered: 23 Dec 2019

Box

Application Shielding First Line of Defense for Financial Apps
sponsored by Intertrust
WEBCAST: In this webinar, join Paul Butterworth, the Director of Product Marketing at Intertrust, as he discusses the risks your financial applications face, best practices for protecting applications, IP and keys and explore some real-world examples from financial services.
Posted: 18 Dec 2019 | Premiered: Oct 29, 2019

Intertrust

Achieving Compliance and Reducing Risk
sponsored by Comforte AG
VIDEO: Mercury Processing Services International needed a solution that would properly meet key requirements of GDPR and PCI DSS, as well as add another layer of protection that renders data useless to potential hackers. In this video, see how comforte’s enterprise data protection platform helped Mercury fulfill their data security requirements.
Posted: 13 Dec 2019 | Premiered: 13 Dec 2019

Comforte AG

Protecting from Bot Attacks with PerimeterX
sponsored by PerimeterX
VIDEO: In this customer success story, Build.com shares how PerimeterX Bot Defender protects their online storefront from advanced bot attacks in the wake of a series of cyberattacks. Watch the video to learn more.
Posted: 10 Dec 2019 | Premiered: 03 Jan 2020

PerimeterX

APIs, digital transformation and the need for a new approach to security
sponsored by Arxan
WEBCAST: Today, most organizations don’t know how many APIs they’ve deployed, let alone if they’re secure. According to recent threat analyses, API exploits are predicted to be the most frequent attack vector in the next two years. Learn how to protect API access from the outside in with this Arxan webinar now.
Posted: 05 Dec 2019 | Premiered: Dec 5, 2019

TOPICS:  Security
Arxan

Banyan Security Zero Trust Remote Access Video
sponsored by Banyan Security
VIDEO: In this video, learn about a singular Zero Trust remote access platform that delivers dynamic trust scoring, continuous authorization and granular access enforcement.
Posted: 02 Dec 2019 | Premiered: 02 Dec 2019

Banyan Security

Is the Cloud Transforming Security?
sponsored by Menlo Security
WEBCAST: As IT teams continue to prioritize cloud transformation, it’s imperative to also reconsider security tactics in order to realize the full benefits of cloud services.In this webinar, leverage industry expertise around cloud transformation, security implications, and explore the benefits of isolation tactics.
Posted: 27 Nov 2019 | Premiered: Nov 27, 2019

Menlo Security

Claroty Continuous Threat Detection Demo
sponsored by Claroty
WEBCAST: Continuous threat detection (CTD) allows for efficient security with minimal complexity compared to traditional threat detection tools. In this webinar, IT leaders at Claroty discuss the importance of total visibility for data acquisition and provide an in-depth demo of their new dashboard. Continue to watch the demo.
Posted: 18 Nov 2019 | Premiered: Nov 18, 2019

Claroty

Automating Identity & Access Management
sponsored by Hitachi ID
WEBCAST: Identity and access management (IAM) is the process of creating new and modifying existing identities as well as managing the security entitlements associated with those identities. In this webcast, discover an overview of introducing automation to your IAM. Watch now to learn more.
Posted: 14 Nov 2019 | Premiered: Feb 28, 2019

Hitachi ID

Structuring an IAM program
sponsored by Hitachi ID
WEBCAST: With the increasing complexity of cyberattacks, managing access has become critical to the protection of data. IAM & PAM programs allow IT teams to monitor privileged accounts and defend against attacks.Watch this webinar to understand what goes into these programs, where it fits within your organization & how to justify the investment.
Posted: 13 Nov 2019 | Premiered: Oct 17, 2019

Hitachi ID

Synthetic Identity - A Rapidly Growing Global Issue
sponsored by RSA Conference
WEBCAST: The RSA Conference eFraud Global Forum brings together anti-fraud leaders from across the world for a candid conversation about e-fraud challenges and solutions. In this webinar, hear from experts in the UK and US as they share the greatest e-fraud challenges they face—including synthetic identity—and how they fight back in this ongoing battle.
Posted: 21 Oct 2019 | Premiered: Oct 21, 2019

RSA Conference

Cloud Security Guardian Integration with Microsoft Azure 2019
sponsored by Barracuda
VIDEO: Designed to integrate with Microsoft Azure 2019 and to leverage built-in security and alerting features, the Cloud Security Guardian will help you establish end-to-end cloud security visibility—a critical requirement in this era of increasing compliance mandates. Tune in now to see how it works.
Posted: 08 Oct 2019 | Premiered: 31 Jul 2019

Barracuda

Tricentis Slams the Door on C-level Email Attacks Using Barracuda Sentinel
sponsored by Barracuda
VIDEO: Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.
Posted: 08 Oct 2019 | Premiered: 31 May 2019

Barracuda

Unified Threat Management: Locking Your Network Down
sponsored by Comcast Business
WEBCAST: While there is no end-to-end "silver bullet" in terms of security solutions, Unified Threat Management (UTM) offers a suite of technologies that can make it a foundational part your network security. In this webinar from Comcast Business, discover UTM capabilities, functions, and benefits.
Posted: 30 Sep 2019 | Premiered: Sep 30, 2019

Comcast Business

Cloud Security Guardian integration with Microsoft Azure 2019
sponsored by Barracuda
VIDEO: In this video, learn about Barracuda Cloud Security Guardian and how it orchestrates, automates, and simplifies configuration and management across all of your Azure firewalls.
Posted: 27 Sep 2019 | Premiered: 10 Jul 2019

Barracuda

Introduction to Claroty
sponsored by Claroty
WEBCAST: In this webcast, Claroty's Dave Weinstein discusses how Claroty's solution helps IoT-OT security and operations teams discover IoT-OT assets on the network and identify vulnerabilities, continuously monitor networks and detect malicious activity and more.
Posted: 27 Sep 2019 | Premiered: Sep 27, 2019

Claroty
1 - 25 of 219 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info