IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Multimedia (View All Report Types)
1 - 25 of 202 Matches Previous Page  |  Next Page
Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
sponsored by Forcepoint
WEBCAST: Some approaches to information security simply won't deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy. In this webcast, Doug Landoll discusses how to take a risk-first approach to addressing information security.
Posted: 15 May 2019 | Premiered: May 15, 2019

Forcepoint

Securing Your Cloud Applications
sponsored by Forcepoint
WEBCAST: Today, the average enterprise customer uses over 1,000 cloud applications. To mitigate security risks, IT leaders need to ensure assets housed in these cloud environments are secure. In this webcast, learn how Forcepoint CASB, along with DLP for Cloud Applications and Web Security tools can help with discovery, enforcement and risk assessment.
Posted: 15 May 2019 | Premiered: May 15, 2019

Forcepoint

The State of the CASB Market
sponsored by Forcepoint
WEBCAST: With CASBs (Cloud Access Security Brokers), organizations can experience the benefits of innovation that cloud applications bring while maintaining control of their data. In this webcast, CEO and Osterman Research founder Mike Osterman will share the results of his survey on how organizations are using, or planning to implement, CASBs.
Posted: 15 May 2019 | Premiered: May 15, 2019

Forcepoint

Security Automation with Ansible
sponsored by Red Hat
WEBCAST: Configuring systems and applications to make life more difficult for attackers is daunting. In this webcast, learn how using the agentless, push-based power of Red Hat Ansible Automation to apply and enforce security standards can help organizations adapt to meet internal and external security guidelines.
Posted: 15 May 2019 | Premiered: May 15, 2019

Red Hat

Understanding Human Behavior to Reduce Risk
sponsored by Forcepoint
WEBCAST: New technologies have changed the way we interact with our data and rendered the old threat-centric security model obsolete. It has also made it much harder to identify good and bad behavior leading to an ambiguous "gray space". In this webcast, learn how adopting a human-centric approach can give IT visibility into the gray space and reduce risk.
Posted: 14 May 2019 | Premiered: May 14, 2019

Forcepoint

California Consumer Privacy Act and the Role of IAM
sponsored by WSO2, Inc.
VIDEO: Tune into this webinar to explore the basics of the California Consumer Privacy Act (CCPA) as well as how enterprises can prepare for it, the difference between GDPR and CCPA, and how IAM can help with CCPA and other privacy regulations.
Posted: 14 May 2019 | Premiered: 14 May 2019

WSO2, Inc.

The Future of Digital IAM
sponsored by WSO2, Inc.
VIDEO: If you're currently evaluating an Identity solution or exploring IAM, this webinar is for you. Download now to learn about the future of IAM and its forecasted trends.
Posted: 13 May 2019 | Premiered: 13 May 2019

WSO2, Inc.

Top 10 Application Security Vulnerabilities for Developers
sponsored by WhiteHat Security
VIDEO: Join Mark Rogan, DAST Manager from the WhiteHat Security Threat Research Center, as he discusses the top vulnerabilities and gives valuable prevention tips for enterprises to implement.
Posted: 13 May 2019 | Premiered: 13 May 2019

WhiteHat Security

Introducing The F5 Advanced WAF
sponsored by F5 Networks
WEBCAST: The F5 Advanced Web Application Firewall (WAF) provides a set of security features that can help keep your Web Applications safe from attack. In this webcast, John Wagnon, Senior Solution Developer at DevCentral, outlines many of the key features offered in the F5 Advanced WAF.
Posted: 08 May 2019 | Premiered: Apr 30, 2018

F5 Networks

What is a Web Application Firewall (WAF)?
sponsored by F5 Networks
WEBCAST: Today, threat vectors are being introduced at all layers of the network. Therefore, it's important to defend your network with more than just a traditional firewall. That's where a Web Application Firewall (WAF) comes in. In this webcast, John Wagnon from DevCentral, outlines what a WAF is and why your web application needs one.
Posted: 08 May 2019 | Premiered: Apr 9, 2019

F5 Networks

Bust Threats or Risk Getting Busted
sponsored by Cisco Umbrella
WEBCAST: In this webcast, learn the latest trends on top threats and best practices you can use to protect against threats in your organization. The webcast also reviews steps you can take to improve your threat detection, prevention and remediation efforts.
Posted: 02 May 2019 | Premiered: Mar 31, 2019

Cisco Umbrella

How to Remove Complexity as a Threat to Security
sponsored by Cyxtera
WEBCAST: Watch this webinar to learn about reducing complexity when securing hybrid workloads.
Posted: 30 Apr 2019 | Premiered: Apr 30, 2019

Cyxtera

Ask the Biometrics Expert: Q&A on the Current State of Biometrics
sponsored by Onfido
VIDEO: Biometric technology has been gathering traction and is becoming almost ubiquitous across a range of industries and applications. But how does it work, what are the benefits, and what do businesses need to look at when implementing the technology? Watch this Q&A with Onfido's biometrics expert, Susana Lopes, to find out.
Posted: 23 Apr 2019 | Premiered: 23 Apr 2019

Onfido

Endpoint Protection Plus Webinar
sponsored by Ziften
WEBCAST: Endpoint protection can be complex and leave your organization vulnerable to attackers. This is because most endpoints aren't patched or users disable security tools. In this webcast, listen as Ziften's Roark Pollock and Logan Gilbert discuss 10 things to consider when looking at endpoint protection platforms.
Posted: 16 Apr 2019 | Premiered: Apr 16, 2019

Ziften

Webinar: Top 6 Security Needs for APIs and Serverless Apps
sponsored by Data Theorem
VIDEO: In this webinar, discover the top 6 API security needs for APIs and apps across serverless platforms such as AWS Lambda, Google Cloud Functions and Azure Functions.
Posted: 12 Apr 2019 | Premiered: 12 Apr 2019

Data Theorem

A Framework for Data Privacy Survival
sponsored by ASG Technologies Group Inc
WEBCAST: Protecting customer data has become increasing difficult due the cyberattack explosion, increasing hacker creativity and the growing amounts of data. In this webcast, listen as Ian Rowlands from ASG Technologies and Kevin Moos from Primitive Logic discuss an integrated framework for customer privacy.
Posted: 11 Apr 2019 | Premiered: Mar 31, 2019

ASG Technologies Group Inc

How to Automate Mobile AppSec without the Staff
sponsored by Data Theorem
WEBCAST: The demand for mobile apps has caused a need for developers to improve and release features at an unprecedented rate to stay ahead of the competition—the hard part is making sure security doesn't fall through the cracks. Watch this webinar to learn top challenges and problems facing security teams for mobile AppSec and how you can remedy them.
Posted: 11 Apr 2019 | Premiered: Apr 11, 2019

Data Theorem

Automating Software Security Checks for Open Source Software and SDKs
sponsored by Data Theorem
WEBCAST: The growth of open source software (OSS) and 3rd-party software development kits (SDKs) have been on the rise over the last 5 years, and for good reason. But there are downsides. Learn about them in this webinar, which covers: Risks of using OSS and SDKs for apps, challenges of staying ahead of vulnerability issues in 3rd-party software, and more.
Posted: 11 Apr 2019 | Premiered: Apr 11, 2019

Data Theorem

Webinar: What's New in iOS 12 Security
sponsored by Data Theorem
WEBCAST: This webcast led by Phillip Tennen of Data Theorem explores the major changes in Apple's iOS 12. Watch now to learn about new security and privacy changes, how to take advantage of these changes and best practices to continuously improve privacy and data security for mobile apps.
Posted: 10 Apr 2019 | Premiered: Oct 22, 2018

Data Theorem

Automate Compliance Audits Without the Staff
sponsored by Data Theorem
WEBCAST: Data security and privacy are top of mind issues for security leaders and corporate boards. However, Agile and DevOps development models are moving too quickly for manual security assurance and compliance validation. In this webcast, learn how to automate the compliance and audit process.
Posted: 09 Apr 2019 | Premiered: Feb 1, 2019

Data Theorem

Shipping Fast
sponsored by Trend Micro, Inc.
WEBCAST: In the security world, you don't normally hear people talking about moving fast. However, a modern and resilient security strategy is just as fast as the rest of your business. In this webcast, listen as Mark Nunnikhoven, VP of Cloud Research at Trend Micro discusses the benefits of reducing the number of security tools your team uses.
Posted: 05 Apr 2019 | Premiered: Apr 5, 2019

Trend Micro, Inc.

Run Applications Anywhere
sponsored by Trend Micro, Inc.
WEBCAST: In this webcast, listen as Mark Nunnikhoven, VP of Cloud Research at Trend Micro discusses how you can implement a simpler strategy for maintaining security while running your applications in any environment.
Posted: 04 Apr 2019 | Premiered: Apr 4, 2019

Trend Micro, Inc.

Building Secure Software
sponsored by Trend Micro, Inc.
WEBCAST: Building securely doesn't just mean the code you are creating is high quality and doesn't have any obvious security vulnerabilities; it's more complicated than that. You have to account for that complexity when checking for vulnerabilities. In this webcast, listen as Mark Nunnikhoven of Trend Micro discusses how to build securely.
Posted: 03 Apr 2019 | Premiered: Apr 3, 2019

Trend Micro, Inc.

The Future of Digital Onboarding
sponsored by Onfido
VIDEO: Today many of the identity indicators we took for granted are no longer fit for purpose. And with the additional challenge of widespread digital onboarding, it can no longer carry that burden. Tune into this webinar for past and emerging identity trends and how your organization can detect potential fraud.
Posted: 03 Apr 2019 | Premiered: 03 Apr 2019

Onfido

Stopping the Exfiltration of Sensitive Data from the Browser
sponsored by Instart
VIDEO: In this webinar, learn how stopping the exfiltration of data from the browser can help you protect your customer's and their most sensitive data today.
Posted: 01 Apr 2019 | Premiered: 01 Apr 2019

Instart
1 - 25 of 202 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement