IT Management  >   Systems Operations  >   Security  >  

Public Safety

RSS Feed    Add to Google    Add to My Yahoo!
Public Safety IT Downloads (View All Report Types)
Business Email Compromise (BEC) Prevention Video Demo
sponsored by Agari
PRODUCT DEMO: Go in-depth on the issue of BEC attacks and what steps they take to gain personal information from companies. You'll not only how to avoid this kind of malicious activity but also how to ensure your employees are only interacting with trusted sources of emails.
Posted: 27 Oct 2016 | Premiered: 19 Oct 2016


Join SafeNet Authentication Free Trial
sponsored by SafeNet Asia Ltd
TRIAL SOFTWARE: Experience low-maintenance and low-cost authorization controls by downloading your free 30-day trial of SafeNet Authentication Service, a cloud-based solution featuring token and self-service capabilities.
Posted: 10 Jan 2014 | Premiered: 10 Jan 2014

SafeNet Asia Ltd

PowerBroker Password Safe: Security, Compliance, Productivity
sponsored by BeyondTrust Corporation
TRIAL SOFTWARE: Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
Posted: 29 Apr 2013 | Premiered: 29 Apr 2013

BeyondTrust Corporation

Deep Defender Blogs
sponsored by Intel
SOFTWARE DOWNLOAD: Find out why protecting your operating system no longer serves as enough security to keep your business safe. By downloading this software, you can see the results of stopping stealth attacks with endpoint security that goes beyond the operating system.
Posted: 03 Oct 2012 | Premiered: 03 Oct 2012


IBM Tivoli Live Monitoring Services Demo
sponsored by IBM
PRODUCT DEMO: Watch this demo to see how Tivoli Live can help you manage the health and performance of your data center's resources—including operating systems, virtualized servers, middleware and applications.
Posted: 20 May 2011 | Premiered: 20 May 2011


Unified Security Management: Real-time Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE: This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
Posted: 24 Mar 2014 | Premiered: 24 Mar 2014


Lumension Endpoint Security: Device Control and Application Control
sponsored by Lumension
TRIAL SOFTWARE: The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.
Posted: 13 Sep 2010 | Premiered: 13 Sep 2010


Increase security and ROI: The benefits of Intel vPro technology
sponsored by Intel
PRODUCT DEMO: Significantly improve your company’s IT security and ROI with the all new 2010 Intel® Core™ vPro™ processor family.
Posted: 28 Apr 2010 | Premiered: 28 Apr 2010


Try Office 365 for free for 30 days
sponsored by Microsoft
TRIAL SOFTWARE: Receive a 30 day no-risk trial of Office 365, a suite of Internet-based services devised to help meet your needs for robust security, 24/7 reliability, and user productivity.
Posted: 01 Jan 2012 | Premiered: 23 Dec 2011


Centrify Express 2010.1
sponsored by Centrify Corporation
SOFTWARE DOWNLOAD: Centrify Express is the #1 choice of IT professionals for Active Directory-based single sign-on to Linux and Mac systems.  It is a free solution with more functionality, tools, and upgrade options than alternative offerings.
Posted: 06 Aug 2010 | Premiered: 06 Aug 2010

Centrify Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement