secure

Related to secure: secure services

secure against (someone or something)

1. To put in place protections against some kind of risk, threat, or danger. The doors have been fitted with deadbolts and security cameras to secure against intruders. We help new business owners secure against all manner of financial pitfalls. The prime minister is trying to secure against a no-confidence vote in parliament.
2. To add protections to something in order to prevent or deter some kind of risk, threat, or danger. In this usage, a noun or pronoun is used between "secure" and "against." We should secure the doors against the rioters outside. The military began cracking down on dissenters to secure its control of the country against rebellion. This program secures software against piracy.
See also: secure
Farlex Dictionary of Idioms.

*a hold on someone a strong

 and secure influence on someone
(*Typically: get ~; have ~; give someone~.) The strange religion seemed to have a strong hold on its followers. The drug has a hold on the minds of those who use it.
See also: hold, on, strong

secure something against (someone, something, or an animal)

 
1. to fasten something against the entry of someone, an animal, or something. Jane secured the doors and windows against the prowler who was roving around the neighborhood. You had better secure the henhouse against coyotes.
2. to obtain a legal order involving someone or something. I secured an injunction against Harry. If he bothers you again, he'll have to go into court to explain himself. We can't secure an injunction against this ruling.
See also: secure
McGraw-Hill Dictionary of American Idioms and Phrasal Verbs.
See also:
  • secure against
  • secure against (someone or something)
  • security
  • lull (one) into a false sense of security
  • lull into a false sense of security
  • behind closed doors
  • stand-in
  • finger (one) as (someone)
  • finger as
  • finger someone as someone
References in periodicals archive
While confusion still surrounds PSD2 in Europe and the transition to the new 3D Secure 2.0 protocol going into effect this year, Credorax's Smart 3D Secure ensures that companies fully comply with the PSD2 requirements for Strong Consumer Authentication.
"The expansion of the Secure PLUS Note Program is part of the increased demand for hassle-free passive income and the best quality Real Estate Mortgage Notes from Secure Note Capital.
Users of Secure Haze can access secure services with a single account on multiple devices.
Secure ICT Webmail provides a secure, browser-based environment equivalent to that of common e-mail client software.
Secure Computing introduces Secure Web Reporter for real-time viewing of web activity, security, performance and compliance
"During the past year, we've been evaluating Secure Computing's Secure Web, along with appliances from other industry leading vendors," reported David Parrish, chief architect of Punahou School's IT network.
Combining TrustedSource with several advanced spam filtering technologies deployed within the solution allows Secure Mail to routinely block more than 99 percent of malicious spam email traffic while maintaining a false positive rate of less than one in one million.
A common option for the 3/4 Nelson is to secure the hold by reaching over the bottom man's left arm instead of reaching for the 1/2 Nelson.
A press release from Redemtech states, "The service, the first of its kind to be offered through an IT asset management company, provides secure transportation of IT assets to ensure the integrity and control of chain-of-custody, reducing the potential for loss or theft of data-bearing assets."
However, companies are now looking beyond traditional perimeter-based security methods to secure data and are focusing on securing the data residing on the storage within their organizations (data at rest) and data moving between their systems on the network and storage devices (data in flight).
To confront these challenges head-on, Georgia-Pacific began devising a blueprint to incorporate secure process control segments that are attached to the business networks, but offer a safe and secure environment in which to operate process control networks.
The Secure PDA Phone will provide secure voice and data communications, including e-mail, web access, and file viewing.
Secure communication systems may be considered the lifeline of C2 on the battlefield and must be available to U.S.
The rating on the money market securities will be the same as the short-term rating of the put counterparty, as illustrated in "Issuance of Money Market Securities for Secure Notes" below.