IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Perimeter SecurityIT Downloads (View All Report Types)
 
Symantec IM Manager
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
Posted: 15 Jun 2006 | Premiered: 01 Mar 2007

Symantec Corporation

EtherScope Series II Network Assistant
sponsored by Fluke Networks
PRODUCT DEMO: EtherScope Series II Network Assistant helps first responders solve network problems on both sides of the access point - fast. This virtual demo will show you an ideal portable platform for rogue hunting and troubleshooting.
Posted: 01 Jun 2007 | Premiered: 01 Jan 2006

Fluke Networks

Worry-Free Business Security Services
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.
Posted: 26 Oct 2010 | Premiered: 26 Oct 2010

Trend Micro, Inc.

Vyatta Community Edition 4 - Open-Source Routing and Security
sponsored by Vyatta Inc.
TRIAL SOFTWARE: Vyatta delivers complete, ready-to-deploy, open-source networking solutions that make it possible for anyone to own an enterprise-class router/firewall/VPN for a fraction of the cost of traditional closed-source, proprietary products.
Posted: 11 Sep 2008 | Premiered: 01 Sep 2008

Vyatta Inc.

Try Office 365 for free for 30 days
sponsored by Microsoft
TRIAL SOFTWARE: Receive a 30 day no-risk trial of Office 365, a suite of Internet-based services devised to help meet your needs for robust security, 24/7 reliability, and user productivity.
Posted: 01 Jan 2012 | Premiered: 23 Dec 2011

Microsoft

LogRhythm 3-Minute Product Demo
sponsored by LogRhythm, Inc.
PRODUCT DEMO: This 3 ¬Ĺ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.
Posted: 09 Sep 2009 | Premiered: 09 Sep 2009

LogRhythm, Inc.

ESET: Threat Center
sponsored by ESET
PRODUCT DEMO: IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.
Posted: 02 Sep 2010 | Premiered: 02 Sep 2010

ESET

Managing Your Network Security with Juniper Networks Flash Demo
sponsored by Juniper Networks, Inc.
SOFTWARE DEMO: Take a tour of the Juniper Networks NetScreen-Security Manager to see how you can manage integrated FW/VPN devices.
Posted: 30 Aug 2006 | Premiered: 30 Aug 2006

Juniper Networks, Inc.

Symantec Protection Suite Challenge
sponsored by Symantec Corporation
SOFTWARE DEMO: Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.
Posted: 28 Jul 2009 | Premiered: 28 Jul 2009

Symantec Corporation

Sophos Computer Security Scan
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.
Posted: 07 Apr 2010 | Premiered: 07 Apr 2010

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement