IT Management  >   Systems Operations  >   Security  >   Web Application Security  >  

.NET Security

RSS Feed    Add to Google    Add to My Yahoo!
.NET SecurityMultimedia (View All Report Types)
 
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
sponsored by AlienVault
WEBCAST: This exclusive webcast covers a unified security management platform that will protect your end-users from watering hole attacks.
Posted: 08 Oct 2014 | Premiered: Oct 8, 2014

AlienVault

Architecting the Ultimate Control Point - Advanced Cyber Threat Mitigation
sponsored by Intel
WEBCAST: This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. View Industry security expert Gunnar Peterson develop a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks.
Posted: 14 Feb 2011 | Premiered: Oct 13, 2010

Intel

Secure Remote Access to VPN with Mobile and Tokenless Authentication
sponsored by HID
VIDEO: This short video depicts how mobile workers can gain secure remote access to the company VPN with mobile and tokenless authentication from HID.
Posted: 22 Oct 2014 | Premiered: 22 Oct 2014

HID

Are You Fully Prepared for Shellshock?
sponsored by Dell Software
WEBCAST: Join this webinar for technical insight into Shellshock, and learn what you can do to protect networks and Linux-based devices from attacks.
Posted: 25 Nov 2014 | Premiered: Nov 25, 2014

Dell Software

Why is Schneider Electric the Right Choice for Prefabricated Data Centers?
sponsored by Schneider Electric
VIDEO: So why is Schneider Electric the right choice for prefabricated data centers? This video examines the proven experience, broad offering of prefab modules, detailed designs, and industry-leading, integrated DCIM software that put Schneider Electric ahead when it comes to prefabricated data centers.
Posted: 30 Oct 2014 | Premiered: 13 Jan 2014

Schneider Electric

Free Trial: ObserveIT User Activity Monitoring
sponsored by ObserveIT
TRIAL SOFTWARE: ObserveIT enables you to identify and investigate suspicious user activity across your entire environment. Register for a free trial now and gain access to the full range of ObserveIT Enterprise features for 15 days.
Posted: 30 Oct 2014 | Premiered: 30 Oct 2014

ObserveIT

How Critical is the Internet for Business Commerce?
sponsored by Akamai Technologies
VIDEO: This short video discusses the critical nature of the internet to all businesses today, from customer-facing websites to business-to-business transactions.
Posted: 31 Oct 2014 | Premiered: 31 Oct 2014

Akamai Technologies

Five Fundamental Network Security Tips
sponsored by CDW Corporation
VIDEO: This video reveals five critical tips that companies should use to enhance their network security.
Posted: 28 Oct 2014 | Premiered: 06 Oct 2014

CDW Corporation

Security University: Mobile Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Lisa Phifer explores innovative approaches to achieve secure mobility, from EMM and BYOA to enterprise cloud and dual persona.
Posted: 11 Nov 2014 | Premiered: 14 Nov 2014

SearchSecurity.com

How to Detect a Ransomeware Infection with AlienVault USM
sponsored by AlienVault
WEBCAST: This exclusive webcast will show you how to detect and prevent ransomware from holding your network hostage.
Posted: 08 Oct 2014 | Premiered: Oct 8, 2014

AlienVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement